Техническая информация
- [<HKCU>\Software\Microsoft\Command Processor] 'AutoRun' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe"'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'tcpsvcs' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'tcpsvcs' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe"'
- %HOMEPATH%\Start Menu\Programs\Startup\tcpsvcs.lnk
- '%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe'
- '<SYSTEM32>\taskkill.exe' /t /f /im "<Имя вируса>.exe"
- '<SYSTEM32>\cmd.exe' /c taskkill /t /f /im "<Имя вируса>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Полный путь к вирусу>" > NUL
- <SYSTEM32>\cmd.exe
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\Component_01
- %APPDATA%\Nwiz.dll
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\tcpsvcs.exe
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\Component_00
- %TEMP%\nsl2.tmp\System.dll
- %APPDATA%\f17.png
- %APPDATA%\FootmanPrior.5FW
- %APPDATA%\SnubCerography.TY6
- %APPDATA%\EpsaState.bin
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'triggerfish' WindowName: ''
- ClassName: 'Indicator' WindowName: ''