Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'CRNJEUFU' = '%APPDATA%\CyberGhost\winservice.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'CRNJEUFU' = '%APPDATA%\CyberGhost\winservice.exe'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\CSC1.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\kbltyh0y.cmdline"
- %TEMP%\CSC1.tmp
- %TEMP%\kbltyh0y.out
- %TEMP%\kbltyh0y.dll
- %TEMP%\RES2.tmp
- %APPDATA%\CyberGhost\winservice.exe
- <LS_APPDATA>\Microsoft\<Имя вируса>.exe_Url_0ztqb42aglxsvmalrv13uwr54evhutlf\1.0.0.0\1owpxj-y.newcfg
- %TEMP%\kbltyh0y.cmdline
- %TEMP%\kbltyh0y.0.cs
- %APPDATA%\CyberGhost\winservice.exe
- %TEMP%\kbltyh0y.dll
- %TEMP%\kbltyh0y.out
- %TEMP%\kbltyh0y.cmdline
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %TEMP%\kbltyh0y.0.cs
- 'ta####rs.dyndns.tv':4132
- DNS ASK ta####rs.dyndns.tv
- '<IP-адрес в локальной сети>':1036
- ClassName: 'Indicator' WindowName: ''