Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '31e37971192fb55657f077e7641d3757' = '"%TEMP%\temp.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '31e37971192fb55657f077e7641d3757' = '"%TEMP%\temp.exe" ..'
- %HOMEPATH%\Start Menu\Programs\Startup\31e37971192fb55657f077e7641d3757.exe
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\temp.exe' = '%TEMP%\temp.exe:*:Enabled:temp.exe'
- '%TEMP%\is-30LFV.tmp\SERPAttacks_Software.tmp' /SL5="$40092,5025422,54272,%TEMP%\SERPAttacks_Software.exe"
- '%TEMP%\temp.exe'
- '%TEMP%\pro.exe'
- '%TEMP%\SERPAttacks_Software.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\temp.exe" "temp.exe" ENABLE
- %TEMP%\is-TQ4V0.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-TQ4V0.tmp\psvince.dll
- %TEMP%\temp.exe
- %TEMP%\is-TQ4V0.tmp\_isetup\_RegDLL.tmp
- %TEMP%\pro.exe
- %TEMP%\SERPAttacks_Software.exe
- %TEMP%\is-30LFV.tmp\SERPAttacks_Software.tmp
- 'ki####e.wow64.net':1177
- DNS ASK ki####e.wow64.net
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'EDIT' WindowName: '(null)'