Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'GFJFFJMCIHKAKDC' = '%WINDIR%\c4j05p.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Chrome Updater' = '%APPDATA%\Google Chrome Updater.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'DCFIPOJILKNAHCN' = '%HOMEPATH%\Desktop\_drugs.txt'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'NADGBAPKFIPCBAP' = '%APPDATA%\0wnzxm.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Gavnoclubs] 'ImagePath' = '<SYSTEM32>\humt32.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Maverikeblos] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Hoobifunai] 'ImagePath' = '%WINDIR%\system\lsass.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Gavnoclubs] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Shvabiaungo] 'ImagePath' = '%WINDIR%\antigoichi.txt.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Musteryousancha] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Maverikeblos] 'ImagePath' = '<SYSTEM32>\vorku.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Shvabiaungo] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Hoobifunai] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Qasaibumers] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Qasaibumers] 'ImagePath' = '%WINDIR%\csrss.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Ucratuns] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Ucratuns] 'ImagePath' = '%WINDIR%\lsass.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Overloadslabs] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Overloadslabs] 'ImagePath' = '%WINDIR%\loadlabs.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SambacoreDrives] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\SambacoreDrives] 'ImagePath' = '%WINDIR%\system\csrss.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\redofanctlgums] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\redofanctlgums] 'ImagePath' = '%WINDIR%\mhdslp.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\xerushione] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\xerushione] 'ImagePath' = '%WINDIR%\iesetup.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\mainfongesurp] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\mainfongesurp] 'ImagePath' = '%WINDIR%\qoasih86.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\twingyrdream] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\twingyrdream] 'ImagePath' = '%WINDIR%\worksn32.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\litematriuq] 'ImagePath' = '<SYSTEM32>.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Ooopsuites] 'ImagePath' = '%WINDIR%\system\faizer.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Shonomalayzeki] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Musteryousancha] 'ImagePath' = '<SYSTEM32>\micro.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Ooopsuites] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Waifiunger] 'ImagePath' = '%WINDIR%\system\isiss.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\litematriuq] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Shonomalayzeki] 'ImagePath' = '%WINDIR%\winzulp.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Waifiunger] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\winheal] 'ImagePath' = '%WINDIR%\help\explorer.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Battlerian] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Lybachkazik] 'ImagePath' = '%WINDIR%\smsd.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\winheal] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Handegrounep] 'ImagePath' = '<SYSTEM32>\subaru.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Varlocknuss] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Battlerian] 'ImagePath' = '%WINDIR%\system\nores.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Handegrounep] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Lybachkazik] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\VesternHuolack] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\VesternHuolack] 'ImagePath' = '%WINDIR%\ausmldh.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\CusonageLkip3vb] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\CusonageLkip3vb] 'ImagePath' = '%WINDIR%\sellmind.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\shannenziy] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\shannenziy] 'ImagePath' = '%WINDIR%\silkex.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\limuaquadfer] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\limuaquadfer] 'ImagePath' = '%WINDIR%\quazv.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\whulmechavni] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\whulmechavni] 'ImagePath' = '%WINDIR%\system\sop.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Tuftagolik] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Tuftagolik] 'ImagePath' = '%WINDIR%\system\mail.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Raitaifaboss] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Raitaifaboss] 'ImagePath' = '%WINDIR%\system\winlogon.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SatisfilmOnaca] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\SatisfilmOnaca] 'ImagePath' = '%WINDIR%\win32drv.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SipressGavnoss] 'ImagePath' = '%WINDIR%\system\smss.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Kalinakrasnay] 'ImagePath' = '<SYSTEM32>\yebachau.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Farkaliansin] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Varlocknuss] 'ImagePath' = '<SYSTEM32>\rotfinkl.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\Kalinakrasnay] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\ValiantsTrei32] 'ImagePath' = '%WINDIR%\smss.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SipressGavnoss] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Farkaliansin] 'ImagePath' = '<SYSTEM32>\mamzell.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\ValiantsTrei32] 'Start' = '00000002'
- '%TEMP%\c3bx94.exe'
- '%WINDIR%\c4j05p.exe'
- '%TEMP%\b2cxog.exe'
- '%APPDATA%\0wnzxm.exe'
- '%TEMP%\a1fsdk.exe'
- '%WINDIR%\win32drv.exe'
- '%WINDIR%\lsass.exe'
- '%TEMP%\l1jv18.exe'
- '%TEMP%\l2e5bo.exe'
- '%TEMP%\l4yim7.exe'
- '%TEMP%\l5o3pc.exe'
- '%TEMP%\l3nt8k.exe'
- '%WINDIR%\csrss.exe'
- '%WINDIR%\system\winlogon.exe'
- '%TEMP%\i9k3li.exe'
- '%WINDIR%\smss.exe'
- '%TEMP%\zi4f89.exe'
- '<SYSTEM32>\cmd.exe' /c del "%TEMP%\c3bx94.exe" >> NUL
- '%TEMP%\l0s13p.exe'
- '%APPDATA%\Google Chrome Updater.exe'
- '%TEMP%\jxb9t2.exe'
- '%WINDIR%\system\sop.exe'
- '%WINDIR%\system\isiss.exe'
- '<SYSTEM32>.exe'
- '%WINDIR%\system\faizer.exe'
- '%WINDIR%\winzulp.exe'
- '%WINDIR%\worksn32.exe'
- '%WINDIR%\qoasih86.exe'
- '%WINDIR%\mhdslp.exe'
- '%WINDIR%\iesetup.exe'
- '<SYSTEM32>\micro.exe'
- '%TEMP%\l6z98r.exe'
- '%TEMP%\l7c43x.exe'
- '%WINDIR%\system\lsass.exe'
- '%WINDIR%\system\csrss.exe'
- '%WINDIR%\antigoichi.txt.exe'
- '<SYSTEM32>\humt32.exe'
- '%WINDIR%\loadlabs.exe'
- '<SYSTEM32>\vorku.exe'
- '%WINDIR%\system\smss.exe'
- '%WINDIR%\Help\explorer.exe'
- '%TEMP%\i3p74g.exe'
- '%TEMP%\i2xen6.exe'
- '%WINDIR%\smsd.exe'
- '%TEMP%\bu45bm.exe'
- '%TEMP%\i4ch6d.exe'
- '%TEMP%\ao9jek.exe'
- '%WINDIR%\silkex.exe'
- '%WINDIR%\quazv.exe'
- '%TEMP%\d1y8h9.exe'
- '%TEMP%\d2po5w.exe'
- '<SYSTEM32>\notepad.exe' %HOMEPATH%\Desktop\_drugs.txt
- '%WINDIR%\sellmind.exe'
- '%TEMP%\i0ve7b.exe'
- '%TEMP%\i1bau3.exe'
- '%TEMP%\d3ls67.exe'
- '%WINDIR%\ausmldh.exe'
- '%TEMP%\i7y1bz.exe'
- '%TEMP%\hb7vt1.exe'
- '%TEMP%\f0li43.exe'
- '%TEMP%\g5ndq2.exe'
- '%TEMP%\iu37cs.exe'
- '%TEMP%\i8ra9f.exe'
- '<SYSTEM32>\mamzell.exe'
- '%WINDIR%\system\mail.exe'
- '%TEMP%\i6o83n.exe'
- '<SYSTEM32>\subaru.exe'
- '%TEMP%\dar57n.exe'
- '%WINDIR%\system\nores.exe'
- '%TEMP%\c6f7hl.exe'
- '%TEMP%\e3hr64.exe'
- '<SYSTEM32>\yebachau.exe'
- '%TEMP%\i5ubas.exe'
- '<SYSTEM32>\rotfinkl.exe'
- %WINDIR%\csrss.exe
- %TEMP%\zi4f89.exe
- <SYSTEM32>\humt32.exe
- %WINDIR%\system\csrss.exe
- %TEMP%\i9k3li.exe
- <SYSTEM32>\vorku.exe
- %TEMP%\jxb9t2.exe
- %WINDIR%\loadlabs.exe
- %WINDIR%\system\lsass.exe
- %TEMP%\g5ndq2.exe
- %WINDIR%\lsass.exe
- %WINDIR%\system\sop.exe
- %TEMP%\i7y1bz.exe
- %WINDIR%\win32drv.exe
- %TEMP%\i8ra9f.exe
- %TEMP%\iu37cs.exe
- %WINDIR%\system\winlogon.exe
- %TEMP%\hb7vt1.exe
- %APPDATA%\Google Chrome Updater.exe
- %TEMP%\l5o3pc.exe
- %TEMP%\l6z98r.exe
- %TEMP%\l4yim7.exe
- %WINDIR%\winzulp.exe
- <SYSTEM32>.exe
- %WINDIR%\worksn32.exe
- %WINDIR%\qoasih86.exe
- %WINDIR%\iesetup.exe
- %TEMP%\l7c43x.exe
- %WINDIR%\system\isiss.exe
- %TEMP%\l1jv18.exe
- %WINDIR%\antigoichi.txt.exe
- %TEMP%\l0s13p.exe
- <SYSTEM32>\micro.exe
- %TEMP%\l3nt8k.exe
- %WINDIR%\mhdslp.exe
- %TEMP%\l2e5bo.exe
- %WINDIR%\system\faizer.exe
- %WINDIR%\quazv.exe
- %TEMP%\d3ls67.exe
- %TEMP%\d2po5w.exe
- %TEMP%\ao9jek.exe
- %TEMP%\i0ve7b.exe
- %WINDIR%\silkex.exe
- %TEMP%\i1bau3.exe
- C:\Documents and Settings\LocalService\Local Settings\Application Data\sLT.exf
- %WINDIR%\Help\explorer.exe
- %TEMP%\a1fsdk.exe
- %TEMP%\b2cxog.exe
- %HOMEPATH%\Desktop\_drugs.txt
- %APPDATA%\0wnzxm.exe
- %TEMP%\c3bx94.exe
- %WINDIR%\sellmind.exe
- %WINDIR%\ausmldh.exe
- %TEMP%\d1y8h9.exe
- %WINDIR%\c4j05p.exe
- %TEMP%\i2xen6.exe
- %WINDIR%\system\mail.exe
- %WINDIR%\smss.exe
- %TEMP%\i5ubas.exe
- %TEMP%\dar57n.exe
- <SYSTEM32>\mamzell.exe
- %WINDIR%\system\smss.exe
- %TEMP%\f0li43.exe
- %TEMP%\e3hr64.exe
- %TEMP%\i6o83n.exe
- <SYSTEM32>\subaru.exe
- %TEMP%\i4ch6d.exe
- %WINDIR%\smsd.exe
- %TEMP%\i3p74g.exe
- %TEMP%\bu45bm.exe
- <SYSTEM32>\yebachau.exe
- %TEMP%\c6f7hl.exe
- %WINDIR%\system\nores.exe
- <SYSTEM32>\rotfinkl.exe
- %TEMP%\c3bx94.exe
- %WINDIR%\c4j05p.exe
- %TEMP%\b2cxog.exe
- %APPDATA%\0wnzxm.exe
- %TEMP%\a1fsdk.exe
- '17#.#1.181.25':22
- '21#.#16.128.27':80
- '17#.#3.33.40':80
- '21#.#2.42.10':80
- '90.##1.124.57':80
- '21#.#24.121.208':80
- '37.##0.227.133':80
- '19#.#16.98.126':80
- '37.##8.207.75':80
- '17#.#3.33.40':8000
- 'al##ds2.eu':80
- '21#.#17.175.4':80
- '31.##0.165.158':80
- '37.##8.207.1':80
- '31.##0.160.109':80
- '19#.#45.209.145':80
- http://37.##0.227.133/
- http://21#.#16.128.27/
- http://21#.#2.42.10/
- http://21#.#24.121.208/
- http://90.##1.124.57/
- http://19#.#16.98.126/
- http://17#.#3.33.40/
- http://31.##0.165.158/
- http://37.##8.207.75/
- http://19#.#45.209.145/
- http://31.##0.160.109/
- http://21#.#17.175.4/
- http://37.##8.207.1/
- http://al##ds2.eu/
- DNS ASK ec###l.co.uk
- DNS ASK nz##l.com
- DNS ASK fo###.antichat.ru
- DNS ASK bi###fast.com
- DNS ASK fa##vps.ru
- DNS ASK www.if##.gov.bz
- DNS ASK www.cr##lub.ws
- DNS ASK www.go##u.co
- DNS ASK go##u.co
- DNS ASK www.nz##l.com
- DNS ASK dd####ttack.info
- DNS ASK fr###hessko.top
- DNS ASK bo####idalavo.ru
- DNS ASK www.xn#######abij1apmyipn.xn--p1ai
- DNS ASK cr##lub.ws
- DNS ASK in##aft.ru
- DNS ASK vy###a-host.ru
- DNS ASK wp#d
- DNS ASK dd###service.ws
- DNS ASK sh###orld.biz
- DNS ASK www.dd####ttack.info
- DNS ASK www.pr##4u.net
- DNS ASK ha#.#llods2.eu
- DNS ASK pr##4u.com
- DNS ASK www.bo####idalavo.ru
- DNS ASK ku##ress.ru
- DNS ASK or##ote.biz
- DNS ASK al##ds2.eu
- DNS ASK a2.##craft.ru
- DNS ASK al##ds2.net
- DNS ASK dc.##lia.com
- DNS ASK www.za##biz.com
- DNS ASK www.fx##0.com
- DNS ASK al###m.bget.ru
- DNS ASK ov###oadlab.com
- DNS ASK www.ge.tt
- DNS ASK www.sh###orld.biz
- DNS ASK xn#######abij1apmyipn.xn--p1ai
- DNS ASK www.ku##ress.ru
- DNS ASK www.dd###service.ws
- DNS ASK www.l3##s.org
- '90.##6.201.51':80
- '22#.#3.34.129':80
- '21#.#12.6.36':88
- '87.##2.67.15':80