Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'gohonoz' = 'rundll32.exe "<LS_APPDATA>\gohonoz.dll",gohonoz'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gohonoz] 'Startup' = 'gohonoz'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gohonoz] 'DllName' = ''
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\rundll32.exe' = '<SYSTEM32>\rundll32.exe*:Enabled:rundll32'
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Rundll32" dir=in action=allow protocol=any program="<SYSTEM32>\rundll32.exe"
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Rundll32" dir=out action=allow protocol=any program="<SYSTEM32>\rundll32.exe"
- '<SYSTEM32>\rundll32.exe' "<LS_APPDATA>\gohonoz.dll",gohonoz <Полный путь к вирусу>
- <LS_APPDATA>\gohonoz.dll
- '85.##.113.54':53
- DNS ASK ca##.##xdreamads.net
- ClassName: 'Indicator' WindowName: ''