Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'UserInit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\system32\explorer.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'explorer' = '<SYSTEM32>\system32\explorer.exe'
- <SYSTEM32>\system32\explorer.exe
- <SYSTEM32>\ping.exe 127.0.0.1 -n 5
- <SYSTEM32>\attrib.exe "<Текущая директория>" +s +h
- <SYSTEM32>\attrib.exe "<Полный путь к вирусу>" +s +h
- %ALLUSERSPROFILE%\Application Data\DYA_LRSPQTROKGQWHTFVN\1.0.0:$SS_DESCRIPTOR_SBXNV9VVGV1BFRVYTJ20C0TJTJMTYTH9HVP63M0FSVF7JBCVP4GV
- %ALLUSERSPROFILE%\Desktop:$SS_DESCRIPTOR_SBXNV9VVGV1BFRVYTJ20C0TJTJMTYTH9HVP63M0FSVF7JBCVP4GV
- <SYSTEM32>\system32\explorer.exe
- %ALLUSERSPROFILE%\Application Data\DYA_LRSPQTROKGQWHTFVN\1.0.0\Data\app.dat
- %ALLUSERSPROFILE%\Application Data\DYA_LRSPQTROKGQWHTFVN\1.0.0\Data\updates.dat
- %APPDATA%\DYA_LRSPQTROKGQWHTFVN\1.0.0\Data\dya.dat
- <Полный путь к вирусу>
- <SYSTEM32>\system32\explorer.exe
- 'sd####23.no-ip.biz':1604
- DNS ASK sd####23.no-ip.biz
- ClassName: '#32770' WindowName: ''
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '#32770' WindowName: 'Program Manager'