Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{R0152R7K-0WI2-FBJ4-1SDU-FWJNTN1U0CCD}] 'StubPath' = '"%APPDATA%\Microsoft\winlogon.exe"'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Winlogon' = 'C:\Documents'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Winlogon' = 'C:\Documents'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Winlogon' = '%APPDATA%\SubFolder\SubFolder\winlogon.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Winlogon' = '%APPDATA%\SubFolder\SubFolder\winlogon.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'NetWire' = '%APPDATA%\Microsoft\winlogon.exe'
- '%APPDATA%\SubFolder\SubFolder\csrss.exe' -keyhide -prochide 2960 -reg %APPDATA%\SubFolder\SubFolder\winlogon.exe -proc 2960 %APPDATA%\SubFolder\SubFolder\winlogon.exe
- '%APPDATA%\Microsoft\winlogon.exe'
- %TEMP%\27015.dmp
- %TEMP%\2909D.dmp
- %APPDATA%\SubFolder\SubFolder\csrss.exe
- %TEMP%\dw.log
- %APPDATA%\Microsoft\winlogon.exe
- %APPDATA%\SubFolder\SubFolder\csrss.exe
- из <Полный путь к вирусу> в %APPDATA%\SubFolder\SubFolder\winlogon.exe
- 'ki####g.ddns.net':3360
- 'localhost':3360
- DNS ASK ki####g.ddns.net
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''