Техническая информация
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = '<SYSTEM32>\Windo\Win32.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = '<SYSTEM32>\Windo\Win32.exe'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = '<SYSTEM32>\Windo\Win32.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = '<SYSTEM32>\Windo\Win32.exe'
- %WINDIR%\syswow64\explorer.exe
- win32.exe
- %WINDIR%\syswow64\windo\win32.exe
- %TEMP%\xx--xx--xx.txt
- %APPDATA%\logs.dat
- %TEMP%\madotate.exe
- %TEMP%\xxx.xxx
- %TEMP%\uuu.uuu
- %TEMP%\rarsfx0\install.reg
- %TEMP%\rarsfx0\madotate.exe
- %TEMP%\rarsfx0\mtatecfg.exe
- %TEMP%\rarsfx0\readme.txt
- %WINDIR%\syswow64\windo\win32.exe
- %APPDATA%\logs.dat
- %TEMP%\xx--xx--xx.txt
- %TEMP%\uuu.uuu
- %TEMP%\xxx.xxx
- %TEMP%\uuu.uuu
- %TEMP%\xxx.xxx
- DNS ASK ma####e54.no-ip.biz
- ClassName: 'EDIT' WindowName: ''
- '%TEMP%\madotate.exe'
- '%TEMP%\rarsfx0\madotate.exe'
- '%WINDIR%\syswow64\windo\win32.exe'
- '%WINDIR%\syswow64\explorer.exe'