Техническая информация
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- [HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- %APPDATA%\microsoft\windows\start menu\programs\startup\5cd8f17f4086744065eb0992a09e05a2.exe
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE
- %TEMP%\trojan.exe
- %LOCALAPPDATA%\microsoft\clr_v4.0_32\usagelogs\<Имя файла>.exe.log
- 'co##############e-chains.prod.autograph.services.mozaws.net':443
- 'zs####wf.ddns.net':1177
- DNS ASK co##############e-chains.prod.autograph.services.mozaws.net
- DNS ASK zs####wf.ddns.net
- '%TEMP%\trojan.exe'
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE (со скрытым окном)