Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'scvhost' = '<SYSTEM32>\scvhost.exe'
- <SYSTEM32>\cacls.exe <SYSTEM32> /e /p everyone:f
- <SYSTEM32>\cacls.exe %TEMP%\ /e /p everyone:f
- <SYSTEM32>\taskkill.exe /im avp.exe /f
- <SYSTEM32>\taskkill.exe /im ekrn.exe /f
- <SYSTEM32>\sc.exe config ekrn start=disabled
- <SYSTEM32>\taskkill.exe egui.exe Jecmd /c
- %WINDIR%\Explorer.EXE
- ccapp.exe
- ekrn.exe
- MCAGENT.EXE
- 360tray.exe
- AVP.EXE
- bdagent.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\count[1].txt
- <SYSTEM32>\svcHost.dll
- <DRIVERS>\Fosg.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\count[1].txt
- <DRIVERS>\Fosg.sys
- из <Полный путь к вирусу> в <SYSTEM32>\scvhost.exe
- 'a1#.#777tt.com':80
- 'cc.#rw3.com':80
- a1#.#777tt.com/01/count.txt
- cc.#rw3.com/01/cc.asp?ma##############################################
- DNS ASK a1#.#777tt.com
- DNS ASK cc.#rw3.com
- ClassName: '' WindowName: ''