Техническая информация
- %APPDATA%\microsoft\windows\start menu\programs\startup\systemnetftpoperationq.url
- '%WINDIR%\syswow64\taskkill.exe' /F /PID 1624
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %TEMP%\499832536.exe
- %HOMEPATH%\documents\iisexpress\nonce\newtonsoftjsonconvertersxmldocumentwrappert.exe
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- DNS ASK j8.####shinonegai.ru
- DNS ASK va######bb-dania.myjino.ru
- DNS ASK 9j###.alabamasan.ru
- ClassName: '' WindowName: ''
- '%TEMP%\499832536.exe'
- '%HOMEPATH%\documents\iisexpress\nonce\newtonsoftjsonconvertersxmldocumentwrappert.exe'
- '%WINDIR%\syswow64\cmd.exe' /C taskkill /F /PID 1624 && choice /C Y /N /D Y /T 3 & Del "%TEMP%\499832536.exe"
- '%WINDIR%\syswow64\choice.exe' /C Y /N /D Y /T 3
- '%WINDIR%\microsoft.net\framework\v4.0.30319\addinprocess32.exe'
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe'