Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'aaa206e85e037ce0e783c92f83a8be17' = '"%TEMP%\ProcessHacker.exe" ..'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'aaa206e85e037ce0e783c92f83a8be17' = '"%TEMP%\ProcessHacker.exe" ..'
- %APPDATA%\microsoft\windows\start menu\programs\startup\aaa206e85e037ce0e783c92f83a8be17.exe
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\ProcessHacker.exe" "ProcessHacker.exe" ENABLE
- %TEMP%\we.exe
- <LS_APPDATA>\isolatedstorage\4zwaorrk.pfi\55o0xith.wtd\url.vygj5cd5t4nvplszxjyx5dzunte2srkn\identity.dat
- <LS_APPDATA>\isolatedstorage\4zwaorrk.pfi\55o0xith.wtd\url.vygj5cd5t4nvplszxjyx5dzunte2srkn\info.dat
- <LS_APPDATA>\isolatedstorage\4zwaorrk.pfi\55o0xith.wtd\url.vygj5cd5t4nvplszxjyx5dzunte2srkn\assemfiles\storage_11eea703297342a5957f1ae8fabcdda8.bin
- %TEMP%\stob.exe
- %TEMP%\processhacker.exe
- DNS ASK ah####ing.ddns.net
- DNS ASK 11############a5957f1ae8fabcdda8.a.8.am.eqatec.com
- '%TEMP%\we.exe'
- '%TEMP%\stob.exe'
- '%TEMP%\processhacker.exe'
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\ProcessHacker.exe" "ProcessHacker.exe" ENABLE' (со скрытым окном)