Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'SystemService' = '%TEMP%\gbot\svchost.exe'
- '%TEMP%\is-P0K8L.tmp\is-80AC5.tmp' /SL4 $40092 "%TEMP%\vnc-4_1_1-x86_win32.exe" 485371 51712
- '%TEMP%\gbot\svchost.exe'
- '%TEMP%\vnc-4_1_1-x86_win32.exe'
- '%TEMP%\1.7.0.exe'
- '<SYSTEM32>\reg.exe' ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run /V "SystemService" /D "%TEMP%\gbot\svchost.exe" /F
- %TEMP%\is-HSR7U.tmp\_shfoldr.dll
- %TEMP%\bc
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\getcmd[1].php
- %TEMP%\gbot\svchost.exe
- %TEMP%\vnc-4_1_1-x86_win32.exe
- %TEMP%\1.7.0.exe
- %TEMP%\is-P0K8L.tmp\is-80AC5.tmp
- %TEMP%\bc
- 'so####y.meximas.com':80
- so####y.meximas.com/botnet(kkd)/getcmd.php?ui###############
- DNS ASK so####y.meximas.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'