Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'Update service' = '%TEMP%\winsvchost\svchost.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] '' = 'vbGH43.exe'
- '%TEMP%\winsvchost\svchost.exe'
- '%TEMP%\MFjk64.exe'
- '<SYSTEM32>\attrib.exe' +S +H +R hosts
- '<SYSTEM32>\reg.exe' add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /ve /d "vbGH43.exe" /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\78hjHG.cmd" "
- '<SYSTEM32>\attrib.exe' -A -H -S -R hosts
- %TEMP%\winsvchost\svchost.exe
- %TEMP%\Lsd.dll
- %WINDIR%\vbGH43.exe
- %TEMP%\78hjHG.cmd
- %TEMP%\MFjk64.exe
- %TEMP%\vbGH43.exe
- %TEMP%\winsvchost\svchost.exe
- %TEMP%\~DF3DAF.tmp
- %TEMP%\Lsd.dll
- %TEMP%\~DF107.tmp
- <DRIVERS>\etc\hosts
- %TEMP%\~DFB2D8.tmp
- 've###zoid.net':80
- ve###zoid.net//././getcmd.php?id####################
- DNS ASK ve###zoid.net
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'EDIT' WindowName: '(null)'