Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Vmwares' = '%PROGRAM_FILES%\PrinC\spooles.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\software\Microsoft\Windows\CurrentVersion\Run" /v "Vmwares" /d "%PROGRAM_FILES%\PrinC\spooles.exe" /f
- '<SYSTEM32>\cmd.exe' /c %TEMP%\320E1709.bat
- '<SYSTEM32>\cmd.exe' /c %TEMP%\4ACA5919.bat
- %PROGRAM_FILES%\PrinC\PrintC.txt
- %PROGRAM_FILES%\PrinC\PrintB.txt
- %PROGRAM_FILES%\PrinC\PrintA.txt
- %TEMP%\4ACA5919.bat
- %TEMP%\320E1709.bat
- из <Полный путь к вирусу> в %PROGRAM_FILES%\PrinC\spooles.exe
- 'ko####.baduki8.com':200
- 'ko####.baduki8.com':2100
- 'ko####.baduki8.com':800
- DNS ASK ko####.baduki8.com
- ClassName: 'Indicator' WindowName: ''