Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}] 'StubPath' = 'c:\dir\install\install\server.exe Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}] 'StubPath' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'Policies' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = ''
- %HOMEPATH%\Start Menu\Programs\Startup\winlogon.pif
- 'C:\dir\install\install\server.exe'
- '%TEMP%\5uhrgap0.ke0.$$$$$$$$$'
- '<SYSTEM32>\attrib.exe' +A +S "<Полный путь к вирусу>"
- %WINDIR%\Explorer.EXE
- %APPDATA%\logs.dat
- %TEMP%\XxX.xXx
- %TEMP%\UuU.uUu
- %TEMP%\5uhrgap0.ke0.$$$$$$$$$
- C:\dir\install\install\server.exe
- %TEMP%\XX--XX--XX.txt
- %APPDATA%\logs.dat
- C:\dir\install\install\server.exe
- <Полный путь к вирусу>
- %TEMP%\XxX.xXx
- %TEMP%\UuU.uUu
- %TEMP%\XX--XX--XX.txt
- 'localhost':81
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'