Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{H8YJTSL8-IX0J-DA8H-4MG1-B4H8E662B030}] 'StubPath' = 'c:\directory\CyberGate\install\server.exe Restart'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- %TEMP%\ddos.exe
- C:\directory\CyberGate\install\server.exe
- %APPDATA%\<Имя вируса>.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\CSC1.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\lxlofzqy.cmdline"
- %TEMP%\ddos.exe
- %TEMP%\%USERNAME%2.txt
- C:\directory\CyberGate\install\server.exe
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%7
- %APPDATA%\%USERNAME%log.dat
- %APPDATA%\<Имя вируса>.exe
- %TEMP%\lxlofzqy.out
- %TEMP%\lxlofzqy.cmdline
- %TEMP%\lxlofzqy.0.cs
- %TEMP%\lxlofzqy.dll
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\%USERNAME%2.txt
- %TEMP%\lxlofzqy.cmdline
- %APPDATA%\<Имя вируса>.exe
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\CSC1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\lxlofzqy.out
- %TEMP%\lxlofzqy.0.cs
- %TEMP%\lxlofzqy.dll
- 'ni####at.no-ip.biz':81
- DNS ASK ni####at.no-ip.biz
- '<IP-адрес в локальной сети>':1035
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''