Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- '%TEMP%\is-7HAS9.tmp\Localfj_vqgrEgB.tmp' /SL5="$20134,3809974,54272,<LS_APPDATA>fj_vqgrEgB.exe"
- '%TEMP%\Trojan.exe'
- '<LS_APPDATA>ICRnsWgvG_.exe'
- '<LS_APPDATA>fj_vqgrEgB.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE
- %TEMP%\is-L5K7S.tmp\_isetup\_shfoldr.dll
- %TEMP%\Trojan.exe
- %TEMP%\is-7HAS9.tmp\Localfj_vqgrEgB.tmp
- <LS_APPDATA>ICRnsWgvG_.exe
- <LS_APPDATA>fj_vqgrEgB.exe
- DNS ASK dn#.##ftncsi.com
- DNS ASK ka###.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''