Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = '%APPDATA%\App\svchost.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft' = '\App\svchost.exe'
- '%TEMP%\<Virus name>\<Virus name>.exe'
- '<SYSTEM32>\taskmgr.exe'
- '<SYSTEM32>\ping.exe' 1.1.1.1 -n 1 -w 1000
- %APPDATA%\App\svchost.exe
- %APPDATA%\Imminent\Path.dat
- C:\App\svchost.exe
- %TEMP%\<Virus name>\<Virus name>.exe
- %APPDATA%\Imminent\Logs\22-04-2014
- %TEMP%\<Virus name>\<Virus name>.exe
- 'fa###rdns.tk':12225
- DNS ASK fa###rdns.tk
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '' WindowName: 'Windows Task Manager'
- ClassName: 'Indicator' WindowName: '(null)'