Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pjct1' = '%APPDATA%\pjct1.cpl'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pjct2' = '%APPDATA%\pjct2.cpl'
- <SYSTEM32>\rundll32.exe Shell32.DLL, Control_RunDLL "%APPDATA%\pjct1.cpl"
- <SYSTEM32>\rundll32.exe Shell32.DLL, Control_RunDLL "%APPDATA%\pjct2.cpl"
- <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v pjct2 /d "%APPDATA%\pjct2.cpl" /f
- <SYSTEM32>\taskkill.exe -f -im rundll32.exe
- <SYSTEM32>\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v pjct1 /d "%APPDATA%\pjct1.cpl" /f
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\pjct3[1].jpg
- %APPDATA%\pjct2.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\upx[1]
- %APPDATA%\pjct3.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pjct1[1].jpg
- %APPDATA%\id
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\pjct2[1].jpg
- %APPDATA%\pjct1.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\upx[1]
- <SYSTEM32>\wbem\Logs\wbemess.lo_
- 'fi###h00.com':80
- fi###h00.com/v7/mutamba23/pjct3.jpg
- fi###h00.com/v7/mutamba23/infect/upx/?ch################################################
- fi###h00.com/v7/mutamba23/pjct1.jpg
- fi###h00.com/v7/mutamba23/pjct2.jpg
- DNS ASK fi###h00.com
- ClassName: 'Indicator' WindowName: ''