Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'bspire' = 'C:\temp\agentm.exe BSPIRE'
- 'C:\temp\agentm.exe' BSPIRE
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v bspire /t REG_SZ /f /d "C:\temp\agentm.exe BSPIRE"
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\ucmd.bat" "<Полный путь к вирусу>" "%TEMP%\ucmd.bat""
- %WINDIR%\Explorer.EXE
- C:\temp\passing.dat
- %TEMP%\DEM1.tmp
- %TEMP%\_q-j.e.tempfile
- C:\temp\agentm.exe
- %TEMP%\ucmd.bat
- 'ya###cache.com':80
- ya###cache.com/001/cache.php?bi##########################################
- DNS ASK ya###cache.com
- ClassName: 'Indicator' WindowName: ''