Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{0X3C7GNJ-FK2I-CL38-Y8A4-DES16MS4GHYW}] 'StubPath' = ''
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{0X3C7GNJ-FK2I-CL38-Y8A4-DES16MS4GHYW}] 'StubPath' = '<SYSTEM32>\svchost\svchost.exe Restart'
- <SYSTEM32>\svchost\svchost.exe
- <SYSTEM32>\svchost.exe
- %WINDIR%\Explorer.EXE
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %APPDATA%\%USERNAME%log.dat
- <SYSTEM32>\svchost\svchost.exe
- %TEMP%\%USERNAME%2.txt
- %APPDATA%\%USERNAME%log.dat
- <SYSTEM32>\svchost\svchost.exe
- <Полный путь к вирусу>
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- 'ar####m.no-ip.biz':82
- DNS ASK ar####m.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''