Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defender' = '"%APPDATA%\Microsoft\Windows Defender\defender.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Host-process' = '"%APPDATA%\Microsoft\Network\Connections\hostdl.exe"'
- %APPDATA%\Microsoft\Windows Defender\CSC1.tmp
- %TEMP%\alm5wjmh.out
- %APPDATA%\Microsoft\Windows Defender\defender.exe
- %TEMP%\RES2.tmp
- %TEMP%\alm5wjmh.cmdline
- %APPDATA%\Microsoft\Internet Explorer\History
- %TEMP%\GlobalHack v.0.7.4.exe
- %TEMP%\alm5wjmh.0.cs
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Windows Defender\defender.exe
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %TEMP%\alm5wjmh.cmdline
- %TEMP%\alm5wjmh.out
- %TEMP%\alm5wjmh.0.cs
- %TEMP%\RES2.tmp
- %APPDATA%\Microsoft\Windows Defender\CSC1.tmp
- 'ip###ger.com':443
- 'wp#d':80
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK ip###ger.com
- DNS ASK wp#d
- '%APPDATA%\Microsoft\Windows Defender\defender.exe'
- '%APPDATA%\Microsoft\Network\Connections\hostdl.exe' "%TEMP%\GlobalHack v.0.7.4.exe"
- '%TEMP%\GlobalHack v.0.7.4.exe'
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%APPDATA%\Microsoft\Windows Defender\CSC1.tmp"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\alm5wjmh.cmdline"