Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ejopymfp' = '"%WINDIR%\ybub\mjyscriw.exe"'
- %WINDIR%\explorer.exe
- <SYSTEM32>\attrib.exe
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\services.exe
- <SYSTEM32>\smss.exe
- <SYSTEM32>\attrib.exe
- %WINDIR%\Explorer.EXE
- System
- %WINDIR%\ybub\mjyscriw.exe
- %ALLUSERSPROFILE%\Application Data\Sun\aksdiqobawic
- %ALLUSERSPROFILE%\Application Data\uvubevuc\ahufwnjtetut
- %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %ALLUSERSPROFILE%\Application Data\uvubevuc\aksdiqobawic
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\1ce5f1ed-4f23-4dc9-ae5d-424061ddaebd
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- '<IP-адрес в локальной сети>':443
- 'my####ispocker.info':443
- DNS ASK my####ispocker.info
- ClassName: 'shell_traywnd' WindowName: ''