Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchc' = 'rundll32.exe "%APPDATA%\svchc.dll",CreateDataObject'
- <SYSTEM32>\rundll32.exe "%APPDATA%\svchc.dll",CreateDataObject
- %APPDATA%\vcpil.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\fid=BwCbAAEAfWUEAAEFCBcAAAAAAAAAAAAAAAAAAACTDQQICwAAAC8oH4PiEVKgrLh0giZvmW_eyWJRAABVVVVVVVVVVVVVVVVVVVVVtCzOAdhCcb19ZQQAVlRRXF5TQlh_Z3d0a2d4anoGAQITkSInYZ[1]
- %APPDATA%\svchc.dll
- '11#####.##n147.filesuploadetc.com':80
- 11#####.##n147.filesuploadetc.com/upload/fid=BwCbAAEAfWUEAAEFCBcAAAAAAAAAAAAAAAAAAACTDQQICwAAAC8oH4PiEVKgrLh0giZvmW_eyWJRAABVVVVVVVVVVVVVVVVVVVVVtCzOAdhCcb19ZQQAVlRRXF5TQlh_Z3d0a2d4anoGAQITkSInYZO9YAAAAAAAAQcAAAAGAAAANFYA
- DNS ASK 11#####.##n147.filesuploadetc.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''