Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'UserInit' = '<SYSTEM32>\userinit.exe,%HOMEPATH%\Documents\DCSCMIN\IMDCSC.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'DarkComet RAT' = '%HOMEPATH%\Documents\DCSCMIN\IMDCSC.exe'
- '%APPDATA%\Roaming\IMDCSC.exe'
- '%HOMEPATH%\Documents\DCSCMIN\IMDCSC.exe'
- '%APPDATA%\Roaming\<Имя вируса>.exe'
- %HOMEPATH%\Documents\DCSCMIN\IMDCSC.exe
- %APPDATA%\Roaming\IMDCSC.exe
- %TEMP%\autE37B.tmp
- %TEMP%\whgrqwq.jpg
- %APPDATA%\Roaming\<Имя вируса>.exe
- %TEMP%\aut51A8.tmp
- %TEMP%\autE37B.tmp
- %TEMP%\aut51A8.tmp
- 'fu#####at2.no-ip.biz':1640
- DNS ASK dn#.##ftncsi.com
- DNS ASK fu#####at2.no-ip.biz
- ClassName: 'Indicator' WindowName: '(null)'