Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MINE' = '%APPDATA%\FUCKYOU\KIS.exe'
- '%APPDATA%\FUCKYOU\KIS.exe'
- '<SYSTEM32>\reg.exe' ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MINE" /t REG_SZ /d "%APPDATA%\FUCKYOU\KIS.exe" /f
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\195468.bat" "
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\699c4b9cdebca7aaea5193cae8a50098_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\13e47537-01e8-4fd5-9c26-32f21b18a5c5
- %TEMP%\195468.bat
- %APPDATA%\FUCKYOU\KIS.exe
- %APPDATA%\FUCKYOU\KIS.exe
- 'an####987.no-ip.biz':3460
- DNS ASK an####987.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'