Техническая информация
- [HKLM\System\CurrentControlSet\Services\CIMKMLWT] 'Start' = '00000002'
- [HKLM\System\CurrentControlSet\Services\CIMKMLWT] 'ImagePath' = '%ALLUSERSPROFILE%\covxiopxzumv\zuawubwzijju.exe'
- 'CIMKMLWT' %ALLUSERSPROFILE%\covxiopxzumv\zuawubwzijju.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
- <SYSTEM32>\conhost.exe
- %WINDIR%\explorer.exe
- %ALLUSERSPROFILE%\covxiopxzumv\zuawubwzijju.exe
- %WINDIR%\temp\ktznopnhsulp.sys
- 'xm#.#miners.com':12222
- DNS ASK xm#.#miners.com
- '%ALLUSERSPROFILE%\covxiopxzumv\zuawubwzijju.exe'
- '<SYSTEM32>\sc.exe' stop UsoSvc
- '<SYSTEM32>\cmd.exe' /c wusa /uninstall /kb:890830 /quiet /norestart
- '<SYSTEM32>\sc.exe' stop WaaSMedicSvc
- '<SYSTEM32>\wusa.exe' /uninstall /kb:890830 /quiet /norestart
- '<SYSTEM32>\sc.exe' stop wuauserv
- '<SYSTEM32>\sc.exe' stop bits
- '<SYSTEM32>\sc.exe' stop dosvc
- '<SYSTEM32>\sc.exe' delete "CIMKMLWT"
- '<SYSTEM32>\sc.exe' create "CIMKMLWT" binpath= "%ALLUSERSPROFILE%\covxiopxzumv\zuawubwzijju.exe" start= "auto"
- '<SYSTEM32>\sc.exe' stop eventlog
- '<SYSTEM32>\sc.exe' start "CIMKMLWT"
- '%WINDIR%\explorer.exe'