Техническая информация
- [HKLM\System\CurrentControlSet\Services\KZEYADMH] 'Start' = '00000002'
- [HKLM\System\CurrentControlSet\Services\KZEYADMH] 'ImagePath' = '%ALLUSERSPROFILE%\hgkyvpwqftjm\pcujumvsnydj.exe'
- [HKLM\System\CurrentControlSet\Services\WinRing0_1_2_0] 'ImagePath' = '%WINDIR%\TEMP\uhjsozyfuizf.sys'
- 'KZEYADMH' %ALLUSERSPROFILE%\hgkyvpwqftjm\pcujumvsnydj.exe
- 'WinRing0_1_2_0' %WINDIR%\TEMP\uhjsozyfuizf.sys
- <SYSTEM32>\nslookup.exe
- %ALLUSERSPROFILE%\hgkyvpwqftjm\pcujumvsnydj.exe
- %WINDIR%\temp\uhjsozyfuizf.sys
- 'hk######r.miningocean.org':5432
- 'hk######r.miningocean.org':5432
- DNS ASK hk######r.miningocean.org
- '%ALLUSERSPROFILE%\hgkyvpwqftjm\pcujumvsnydj.exe'
- '<SYSTEM32>\sc.exe' delete "KZEYADMH"
- '<SYSTEM32>\sc.exe' create "KZEYADMH" binpath= "%ALLUSERSPROFILE%\hgkyvpwqftjm\pcujumvsnydj.exe" start= "auto"
- '<SYSTEM32>\sc.exe' stop eventlog
- '<SYSTEM32>\sc.exe' start "KZEYADMH"
- '<SYSTEM32>\nslookup.exe'