Техническая информация
- [<HKLM>\SOFTWARE\Classes\MSProgramGroup\Shell\Open\Command] '' = '<SYSTEM32>\grpconv.exe %1'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'GrpConv' = 'grpconv -o'
- %WINDIR%\Tasks\ВМ»Ї.bat
- [<HKLM>\SYSTEM\ControlSet001\Services\Windows DNS Remote Client] 'Start' = '00000002'
- %WINDIR%\Temp\conime.exe exec
- %WINDIR%\Temp\conime.exe nt
- <SYSTEM32>\runonce.exe -r
- <SYSTEM32>\grpconv.exe -o
- <SYSTEM32>\rundll32.exe SHELL32.DLL,ShellExec_RunDLL %WINDIR%\temp\conime.exe exec
- <SYSTEM32>\rundll32.exe SHELL32.DLL,ShellExec_RunDLL <Полный путь к вирусу> install
- <SYSTEM32>\cmd.exe /c %WINDIR%\temp\km.bat
- <SYSTEM32>\rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 %WINDIR%\temp\km.inf
- %WINDIR%\Temp\km.bat
- %WINDIR%\Temp\km.inf
- %WINDIR%\Temp\conime.exe
- %WINDIR%\Temp\km.bat
- %WINDIR%\Temp\km.inf
- 'tx#.#ingak.com':17173
- DNS ASK tx#.#ingak.com