Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defender' = '"%APPDATA%\Microsoft\Windows Defender\defender.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Host-process' = '"%APPDATA%\Microsoft\Network\Connections\hostdl.exe"'
- %TEMP%\qd4a23zi.out
- %TEMP%\qd4a23zi.cmdline
- %APPDATA%\Microsoft\Windows Defender\CSC1.tmp
- %APPDATA%\Microsoft\Windows Defender\defender.exe
- %TEMP%\RES2.tmp
- %TEMP%\qd4a23zi.0.cs
- <Текущая директория>\1.exe
- <Текущая директория>\2.bat
- C:\program\1.exe
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %APPDATA%\Microsoft\Windows Defender\CSC1.tmp
- %TEMP%\RES2.tmp
- 'ip###ger.com':443
- 'wp#d':80
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK ip###ger.com
- DNS ASK wp#d
- ClassName: 'EDIT' WindowName: ''
- '%APPDATA%\Microsoft\Network\Connections\hostdl.exe' "c:\program\1.exe"
- 'C:\program\1.exe'
- '<Текущая директория>\1.exe' -p12351 -d%ProgramFiles%
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%APPDATA%\Microsoft\Windows Defender\CSC1.tmp"
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\csc.exe' /noconfig /fullpaths @"%TEMP%\qd4a23zi.cmdline"
- '<SYSTEM32>\cmd.exe' /c ""<Текущая директория>\2.bat" "