Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'scvhost' = '<SYSTEM32>\scvhost.exe'
- '<SYSTEM32>\cacls.exe' <SYSTEM32> /e /p everyone:f
- '<SYSTEM32>\cacls.exe' %TEMP%\ /e /p everyone:f
- '<SYSTEM32>\taskkill.exe' /im avp.exe /f
- '<SYSTEM32>\taskkill.exe' /im ekrn.exe /f
- '<SYSTEM32>\sc.exe' config ekrn start=disabled
- '<SYSTEM32>\taskkill.exe' egui.exe Jecmd /c
- %WINDIR%\Explorer.EXE
- bdagent.exe
- ekrn.exe
- 360tray.exe
- AVP.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\count[1].txt
- <SYSTEM32>\svcHost.dll
- <DRIVERS>\Fosg.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\count[1].txt
- <DRIVERS>\Fosg.sys
- из <Полный путь к вирусу> в <SYSTEM32>\scvhost.exe
- 'c3#.#777tt.com':80
- 'cc.#rw3.com':80
- c3#.#777tt.com/03/count.txt
- cc.#rw3.com/03/cc.asp?ma##############################################
- DNS ASK c3#.#777tt.com
- DNS ASK cc.#rw3.com
- ClassName: '(null)' WindowName: '(null)'