Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'system' = '<SYSTEM32>\system.exe'
- '<SYSTEM32>\sc.exe' stop 360rp
- '<SYSTEM32>\sc.exe' delete 360rp
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\jidvq.dll Exucute
- '<SYSTEM32>\sc.exe' delete ZhuDongFangYu
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\kuxjk.dll Exucute
- '<SYSTEM32>\runonce.exe' -r
- '<SYSTEM32>\sc.exe' stop ZhuDongFangYu
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\cscript.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\ctfmon.exe
- ekrn.exe
- 360tray.exe
- NtCreateProcessEx, драйвер-обработчик: CDriver.sys
- <DRIVERS>\SET3.tmp
- %WINDIR%\inf\oem3.PNF
- %TEMP%\4.tmp
- <SYSTEM32>\jidvq.dll
- %PROGRAM_FILES%\KAV\CDriver.sys
- <SYSTEM32>\kuxjk.dll
- %WINDIR%\inf\oem3.inf
- %PROGRAM_FILES%\KAV\CDriver.Inf
- <DRIVERS>\SET3.tmp в <DRIVERS>\CDriver.sys
- из <Полный путь к вирусу> в <SYSTEM32>\system.exe
- 'rm##.t2an.com':8080
- DNS ASK rm##.t2an.com
- ClassName: '(null)' WindowName: 'MiniSniffer'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'