Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'iwyzylyg' = '"%WINDIR%\iwyb\yragrfir.exe"'
- '%APPDATA%\Microsoft\<Имя вируса>.exe'
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '%WINDIR%\explorer.exe'
- '<SYSTEM32>\attrib.exe'
- <SYSTEM32>\cscript.exe
- %WINDIR%\explorer.exe
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\attrib.exe
- <SYSTEM32>\ctfmon.exe
- %ALLUSERSPROFILE%\Application Data\imonyjyk\ngufyzyg.dat
- %ALLUSERSPROFILE%\Application Data\Sun\ehusycof.bkp
- %WINDIR%\iwyb\yragrfir.exe
- %ALLUSERSPROFILE%\Application Data\imonyjyk\ubuzgpag.dat
- %APPDATA%\Microsoft\<Имя вируса>.exe
- %ALLUSERSPROFILE%\Application Data\imonyjyk\ehusycof.dat
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- <SYSTEM32>\PerfStringBackup.TMP
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- '20#.#6.232.182':80
- 'xs###agazine.ru':443
- 20#.#6.232.182/
- DNS ASK microsoft.com
- DNS ASK xs###agazine.ru
- ClassName: 'shell_traywnd' WindowName: ''