Техническая информация
- %APPDATA%\microsoft\windows\start menu\programs\startup\bit195e.tmp
- %WINDIR%\tasks\rvp.job
- <SYSTEM32>\tasks\rvp
- '%TEMP%\7378428.exe'
- <Текущая директория>\banquo.dll
- '<SYSTEM32>\extrac32.exe'
- <SYSTEM32>\extrac32.exe
- %WINDIR%\syswow64\extrac32.exe
- %WINDIR%\syswow64\cmd.exe
- <Текущая директория>\banquo.dll
- %TEMP%\1100908.dat
- %TEMP%\7378428.exe
- %TEMP%\bit62be.tmp
- %TEMP%\68e7e247.png
- %APPDATA%\adobe\acrobat\bite70.tmp
- %TEMP%\59128942.lnk
- %APPDATA%\remcos\newlogs.dat
- %APPDATA%\adobe\acrobat\bite70.tmp
- %APPDATA%\microsoft\windows\start menu\programs\startup\bit195e.tmp
- %TEMP%\bit62be.tmp
- %APPDATA%\adobe\acrobat\bite70.tmp в %APPDATA%\adobe\acrobat\rvp.exe
- http://oc##.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD%2Fyl6nWPkczAQUe1tFz6%2FOy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS%2BzcBkvzl4%3D
- DNS ASK pa###bin.com
- DNS ASK i.##gur.com
- DNS ASK ne####k.jcgwood.com
- DNS ASK oc##.thawte.com
- '%WINDIR%\syswow64\extrac32.exe'
- '%WINDIR%\syswow64\cmd.exe'