Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'AudioCard' = '%APPDATA%\AudioCard\AudioCard.exe'
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3428
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3944
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4684
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4160
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4864
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3000
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3240
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3640
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4876
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4884
- '%APPDATA%\AudioCard\SoundCard.exe' -a scrypt -o http://ni#######.1:x@pooledbits.com:8337 -T 83 -l yes -t 1
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=5376
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=3008
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4064
- '%APPDATA%\AudioCard\SoundCard.exe' /pid=4704
- '%APPDATA%\AudioCard\SoundCard.exe' (загружен из сети Интернет)
- %APPDATA%\AudioCard\SoundCard.exe
- из <Полный путь к вирусу> в %APPDATA%\AudioCard\AudioCard.exe
- 'my####emshake.info':80
- 'wp#d':80
- my####emshake.info/UFA.exe
- wp#d/wpad.dat
- DNS ASK my####emshake.info
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: '(null)'