Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%APPDATA%\udLBfEuNPwTu\RBchppI.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ImgBurn' = '%APPDATA%\Install\ImgBurn.exe'
- '%APPDATA%\Install\ImgBurn.exe'
- '<SYSTEM32>\ping.exe' 127.0.0.1
- '<SYSTEM32>\cmd.exe' /c ping 127.0.0.1 & del "%APPDATA%\Install\ImgBurn.exe"
- '<SYSTEM32>\cmd.exe' /c ping 127.0.0.1 & del "<Полный путь к вирусу>"
- '%APPDATA%\Install\ImgBurn.exe'
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' -%APPDATA%\udLBfEuNPwTu\RBchppI.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- %APPDATA%\Install\.Identifier
- %APPDATA%\Install\ImgBurn.exe
- %APPDATA%\udLBfEuNPwTu\9128.xml
- %APPDATA%\udLBfEuNPwTu\RBchppI.exe
- %APPDATA%\Install\.Identifier
- %APPDATA%\udLBfEuNPwTu\9128.xml в %APPDATA%\udLBfEuNPwTu\RBchppI.exe
- 'de####nboc.ddns.net':9500
- DNS ASK de####nboc.ddns.net
- ClassName: 'Indicator' WindowName: ''