Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'Microsoft Windows DPS Service' = '%APPDATA%\DPSService\dpsservice.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Windows DPS Service' = '%APPDATA%\DPSService\dpsservice.exe'
- '%TEMP%\svchost.exe' -a cryptonight -o stratum+tcp://xmr.farm:3333 -u 45VGQ59BKuqRnUWaGzw5r17xhgnzPteTXAXqfDLnPswLEjGS3xi9MxZb1MCV2sAyj9MZ3v1tohdLa34hZVvzmkn3EYJAaVE -p x -t 2
- '%APPDATA%\DPSService\dpsservice.exe' <Полный путь к вирусу>
- '<SYSTEM32>\sc.exe' delete "Windows Ssyncer"
- '<SYSTEM32>\sc.exe' stop "Windows ssyncer agent"
- '<SYSTEM32>\taskkill.exe' /f /im ssyncer.exe
- '<SYSTEM32>\sc.exe' delete "Windows ssyncer agent"
- '<SYSTEM32>\sc.exe' stop "Windows Ssyncer"
- '<SYSTEM32>\taskkill.exe' /f /im cmd.exe
- '<SYSTEM32>\taskkill.exe' /f /im CheckServer.exe
- '<SYSTEM32>\taskkill.exe' /f /im exceptionfilter.exe
- '<SYSTEM32>\taskkill.exe' /f /im WerFault.exe
- <SYSTEM32>\cmd.exe
- %TEMP%\msvcr100.dll
- %TEMP%\pthreadVC2.dll
- %TEMP%\libcurl.dll
- %APPDATA%\DPSService\dpsservice.exe
- %TEMP%\svchost.exe
- %TEMP%\msvcr100.dll
- %TEMP%\pthreadVC2.dll
- %TEMP%\libcurl.dll
- %APPDATA%\DPSService\dpsservice.exe
- %TEMP%\svchost.exe
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WINHELP' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Indicator' WindowName: ''