Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\r_server] 'ImagePath' = '"<SYSTEM32>\administration_assembly\access_protocol\svchost.exe" /service'
- [<HKLM>\SYSTEM\ControlSet001\Services\r_server] 'Start' = '00000002'
- '<SYSTEM32>\administration_assembly\access_protocol\svchost.exe' /silence /start
- '<SYSTEM32>\administration_assembly\access_protocol\svchost.exe' /service
- '<SYSTEM32>\administration_assembly\access_protocol\svchost.exe' /install /silence
- '<SYSTEM32>\cmd.exe' /c %TEMP%\bt7503.bat <Полный путь к вирусу>
- '%WINDIR%\regedit.exe' /s "%WINDIR%/system32/administration_assembly/access_protocol/111.reg"
- <SYSTEM32>\administration_assembly\access_protocol\raddrv.dll
- <SYSTEM32>\administration_assembly\access_protocol\svchost.exe
- <SYSTEM32>\administration_assembly\access_protocol\111.reg
- <SYSTEM32>\administration_assembly\access_protocol\AdmDll.dll
- %TEMP%\bt7503.bat
- <LS_APPDATA>\AdmDll.dll
- <LS_APPDATA>\111.reg
- <LS_APPDATA>\svchost.exe
- <LS_APPDATA>\raddrv.dll
- %TEMP%\bt7503.bat
- <LS_APPDATA>\raddrv.dll
- <LS_APPDATA>\svchost.exe
- <LS_APPDATA>\AdmDll.dll
- %TEMP%\bt7503.bat
- <LS_APPDATA>\111.reg
- ClassName: 'RegEdit_RegEdit' WindowName: ''