Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'avs' = '%APPDATA%\avs.exe'
- '%APPDATA%\avs.exe'
- '%HOMEPATH%\Local Settings\TempGather Proxy.exe'
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\vbc.exe'
- '<SYSTEM32>\ping.exe' -n 0127.0.0.1
- '<SYSTEM32>\cmd.exe' /c %HOMEPATH%\Local Settings\Tempscratch.bat
- %WINDIR%\Microsoft.NET\Framework\v4.0.30319\vbc.exe
- %TEMP%\aut3.tmp
- %TEMP%\aut2.tmp
- %HOMEPATH%\Local Settings\Tempscratch.bat
- %TEMP%\2649C.dmp
- %TEMP%\dw.log
- %TEMP%\temp
- %TEMP%\1olcy48vhjJRLb0Ue4eLFefZq
- %HOMEPATH%\Local Settings\TempGather Proxy.exe
- %TEMP%\aut1.tmp
- %APPDATA%\avs.exe:Zone.Identifier
- %APPDATA%\avs.exe
- <Полный путь к вирусу>:Zone.Identifier
- %TEMP%\aut3.tmp
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- 'nt##b.org':80
- nt##b.org/gpservices/getupdate/?tm#####################################################################################################
- DNS ASK nt##b.org
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''