Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'system' = '<SYSTEM32>\system.exe'
- '<SYSTEM32>\juvss.exe'
- '<SYSTEM32>\pxcft.exe'
- '<SYSTEM32>\hmweo.exe'
- '<SYSTEM32>\useop.exe'
- '<SYSTEM32>\sc.exe' config WinDefend start= disabled
- '<SYSTEM32>\net.exe' stop MpsSvc
- '<SYSTEM32>\net.exe' stop WinDefend
- '<SYSTEM32>\net1.exe' stop WinDefend
- '<SYSTEM32>\net1.exe' stop MpsSvc
- '<SYSTEM32>\sc.exe' config MpsSvc start= disabled
- '<SYSTEM32>\sc.exe' stop 360rp
- '<SYSTEM32>\sc.exe' delete ZhuDongFangYu
- '<SYSTEM32>\sc.exe' stop ZhuDongFangYu
- '<SYSTEM32>\sc.exe' delete ekrn
- '<SYSTEM32>\sc.exe' stop ekrn
- '<SYSTEM32>\sc.exe' delete 360rp
- MCAGENT.EXE
- ekrn.exe
- 360tray.exe
- <SYSTEM32>\juvss.exe
- <SYSTEM32>\pxcft.exe
- %TEMP%\1.tmp
- <SYSTEM32>\hmweo.exe
- %PROGRAM_FILES%\AAV\CDriver.sys
- <SYSTEM32>\useop.exe
- <SYSTEM32>\juvss.exe
- <SYSTEM32>\useop.exe
- <SYSTEM32>\hmweo.exe
- from <Full path to virus> to <SYSTEM32>\system.exe
- 'e0#.#swdy.com':8080
- DNS ASK e0#.#swdy.com