Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ASDSvc.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MUpdate2.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\restrict.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\1390bcs] 'ImagePath' = '<DRIVERS>\1390bcs.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\1390bcs] 'Start' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\e230rafdgfaLhgfdjhfdjhgjh4jhg\Parameters] 'ServiceDll' = '<SYSTEM32>\mt1fa68m.dll'
- [<HKLM>\SYSTEM\ControlSet001\Services\e230rafdgfaLhgfdjhfdjhgjh4jhg] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\e230rafdgfaLhgfdjhfdjhgjh4jhg] 'ImagePath' = '<SYSTEM32>\svchost.exe -k "e230rafdgfaLhgfdjhfdjhgjh4jhg"'
- '<SYSTEM32>\cmd.exe' /c del <Полный путь к вирусу>
- '<SYSTEM32>\svchost.exe' -k "e230rafdgfaLhgfdjhfdjhgjh4jhg"
- <DRIVERS>\1390bcs.sys
- %WINDIR%\Temp\132375.dat
- <SYSTEM32>\mt1fa68m.dll
- <SYSTEM32>\RCX1.tmp
- %WINDIR%\Temp\132375.dat
- <SYSTEM32>\mt1fa68m.dll
- <SYSTEM32>\mt1fa68m.dll
- 'nq#####lgv351.vicp.cc':100
- 'qo####s1.vicp.cc':100
- 'hq####ksad4.vicp.cc':100
- DNS ASK nq#####lgv351.vicp.cc
- DNS ASK qo####s1.vicp.cc
- DNS ASK hq####ksad4.vicp.cc