Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] '*-165367247' = '"%WINDIR%\-165367247\taskhost.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] '*-165367247' = '"%WINDIR%\-165367247\taskhost.exe"'
- %HOMEPATH%\Start Menu\Programs\Startup\config.exe
- скрытых файлов
- '%HOMEPATH%\dwm.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\I-165367247.bat" "
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
- %TEMP%\I-165367247.bat
- %TEMP%\aut2.tmp
- %HOMEPATH%\dwm.exe
- %TEMP%\aut1.tmp
- %TEMP%\f.txt
- %HOMEPATH%\Start Menu\Programs\Startup\config.exe
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- %HOMEPATH%\dwm.exe
- из <Полный путь к вирусу> в %WINDIR%\-165367247\taskhost.exe
- 'ir#.##killer.com':6667
- DNS ASK ir#.##killer.com
- ClassName: '#32770' WindowName: 'Windows Task Manager'