Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] '*CryptoLocker' = '"<LS_APPDATA>\Fpivibovqxopnnv.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'CryptoLocker' = '"<LS_APPDATA>\Fpivibovqxopnnv.exe"'
- '<LS_APPDATA>\Fpivibovqxopnnv.exe' -wd4
- '<LS_APPDATA>\Fpivibovqxopnnv.exe' "-r<Полный путь к вирусу>"
- %TEMP%\NLK57D1.tmp
- %TEMP%\TKS4560.tmp
- %TEMP%\EHO88F4.tmp
- <LS_APPDATA>\Fpivibovqxopnnv.exe
- <LS_APPDATA>\Fpivibovqxopnnv.exe
- %TEMP%\TKS4560.tmp
- %TEMP%\NLK57D1.tmp
- %TEMP%\EHO88F4.tmp
- DNS ASK dh#####yfnbulyi.info
- DNS ASK wy#####yvknaius.co.uk
- DNS ASK qt####bxhqfgtgu.com
- DNS ASK so####ntetkftgj.biz
- DNS ASK fc####xucqgtuif.net
- DNS ASK uk####olxjvtici.net
- DNS ASK im####iqmakoo.com
- DNS ASK hr####teweephfm.biz
- DNS ASK jm####gathjojps.org
- DNS ASK ue####jdyhibptu.ru
- ClassName: 'Indicator' WindowName: '(null)'