Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] '*-1128689957' = '"%WINDIR%\-1128689957\winlogon.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] '*-1128689957' = '"%WINDIR%\-1128689957\winlogon.exe"'
- скрытых файлов
- '<SYSTEM32>\schtasks.exe' /CREATE /SC ONLOGON /TN A-1128689957 /TR %WINDIR%\-1128689957\winlogon.exe /RL HIGHEST
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\I-1128689957.bat" "
- '%WINDIR%\explorer.exe'
- %WINDIR%\Explorer.EXE
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
- %TEMP%\I-1128689957.bat
- %HOMEPATH%\conhost.exe
- %HOMEPATH%\conhost.exe
- %HOMEPATH%\conhost.exe
- из <Полный путь к вирусу> в %WINDIR%\-1128689957\winlogon.exe
- 'bo####.#rivategaming.info':6667
- DNS ASK bo####.#rivategaming.info
- ClassName: '' WindowName: ''
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: '#32770' WindowName: 'Windows Task Manager'
- ClassName: 'BaseBar' WindowName: 'ChanApp'
- ClassName: 'Shell_TrayWnd' WindowName: ''