Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '08f4dc96bbb7af09d1a37fe35c75a42f' = '"%TEMP%\explorer.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '08f4dc96bbb7af09d1a37fe35c75a42f' = '"%TEMP%\explorer.exe" ..'
- %HOMEPATH%\Start Menu\Programs\Startup\08f4dc96bbb7af09d1a37fe35c75a42f.exe
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\explorer.exe' = '%TEMP%\explorer.exe:*:Enabled:explorer.exe'
- %TEMP%\explorer.exe
- %TEMP%\2.exe
- %TEMP%\1.exe
- <SYSTEM32>\netsh.exe firewall add allowedprogram "%TEMP%\explorer.exe" "explorer.exe" ENABLE
- %TEMP%\DF53.tmp\DfDiagnoseDll.dll
- %TEMP%\DF53.tmp\WksHelp.rtf
- %TEMP%\DF53.tmp\dfcusti.rdx
- %TEMP%\explorer.exe
- %TEMP%\DF53.tmp\qDisk.sys
- %TEMP%\DF53.tmp\LogonDll.Dll
- %TEMP%\aut2.tmp
- %TEMP%\1.exe
- %TEMP%\aut1.tmp
- %TEMP%\DF53.tmp\FrzState2k.exe
- %TEMP%\DF53.tmp\DepFrz.rdx
- %TEMP%\2.exe
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- 'ab#.#ytes.net':124
- DNS ASK ab#.#ytes.net
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''