Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'gUECCTjVVAVhLfOTUHIgMRXjMAiZOOJWMWZDcEFN' = '%WINDIR%\nvvsvc.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'gUECCTjVVAVhLfOTUHIgMRXjMAiZOOJWMWZDcEFN' = '%WINDIR%\nvvsvc.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'gUECCTjVVAVhLfOTUHIgMRXjMAiZOOJWMWZDcEFN' = '%WINDIR%\nvvsvc.exe'
- %WINDIR%\nvvsvc.exe
- <SYSTEM32>\attrib.exe "<Полный путь к вирусу>" -h -r -s
- <SYSTEM32>\cmd.exe /c ""<Текущая директория>\Kill.bat" "
- <Полный путь к вирусу>
- %WINDIR%\nvvsvc.exe
- %WINDIR%\nvvsvc.exe
- <Текущая директория>\Kill.bat
- <SYSTEM32>\MSWINSCK.ocx
- %WINDIR%\nvvsvc.exe
- %TEMP%\~DFD7F0.tmp
- 'gk####.zapto.org':77
- 'ru####.hostple.net':80
- ru####.hostple.net/SaMaeDown/MSWINSCK.OCX
- DNS ASK gk####.zapto.org
- DNS ASK ru####.hostple.net
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''