Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{44XUEW35-U6WD-4452-J382-80T727XT03WQ}] 'StubPath' = '%WINDIR%\AppPatch\AcAdProc.dll Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{44XUEW35-U6WD-4452-J382-80T727XT03WQ}] 'StubPath' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\spoolsv.exe
- <SYSTEM32>\alg.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\services.exe
- System
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\smss.exe
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\csrss.exe
- %APPDATA%\logs.dat
- %TEMP%\XxX.xXx
- %TEMP%\UuU.uUu
- %TEMP%\XX--XX--XX.txt
- <Полный путь к вирусу>-up.txt
- %WINDIR%\AppPatch\AcAdProc.dll
- %APPDATA%\logs.dat
- %WINDIR%\AppPatch\AcAdProc.dll
- %TEMP%\UuU.uUu
- %TEMP%\XX--XX--XX.txt
- 'eg######7snipers.hopto.org':7777
- DNS ASK eg######7snipers.hopto.org
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''