Техническая информация
- %HOMEPATH%\Start Menu\Programs\Startup\explorer.lnk
- %TEMP%\VKBO.exe
- C:\ProgramData\Windows\Windows Defender notification icon.VBS
- C:\ProgramData\Windows\Windows Defender notification icon.VBS — ярлык.lnk
- C:\ProgramData\Windows\System32Windows.exe
- %TEMP%\RarSFX0\antivirus.exe
- C:\ProgramData\Windows\security.bat
- C:\ProgramData\Windows\antivirus.exe
- C:\ProgramData\Windows\System32Windows.bat
- %TEMP%\1.vbs
- %TEMP%\Reliz3250.exe
- %HOMEPATH%\Desktop\VKBreakOpen.exe
- %TEMP%\DesktopZ1.exe
- %TEMP%\Zsecurity.bat
- %TEMP%\XZCDesktop.exe
- %TEMP%\w123w.exe
- %TEMP%\Reliz6450.exe
- C:\ProgramData\Windows\1530763342_log.txt
- 'xm#.###l.minergate.com':45700
- DNS ASK xm#.###l.minergate.com
- ClassName: 'EDIT' WindowName: ''
- '%TEMP%\XZCDesktop.exe'
- '%TEMP%\VKBO.exe'
- '%TEMP%\w123w.exe'
- '%TEMP%\DesktopZ1.exe' -p1 -d%HOMEPATH%\Local Settings\Temp
- '<SYSTEM32>\wscript.exe' "%TEMP%\1.vbs"
- '%TEMP%\Reliz3250.exe'
- 'C:\ProgramData\Windows\antivirus.exe' -p1 -dC:\ProgramData\Windows
- '%TEMP%\RarSFX0\antivirus.exe'
- 'C:\ProgramData\Windows\System32Windows.exe' -o stratum+tcp://xmr.pool.minergate.com:45700 -u ShadowBreaking@mail.ru -p x -t 1
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\Zsecurity.bat" "
- '<SYSTEM32>\cmd.exe' /c ""C:\ProgramData\Windows\security.bat" "
- '<SYSTEM32>\wscript.exe' "C:\ProgramData\Windows\Windows Defender notification icon.VBS"
- '<SYSTEM32>\cmd.exe' /c ""C:\ProgramData\Windows\System32Windows.bat" "