Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Seashell' = 'C:\Documents'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Seashell' = 'C:\Documents'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Seashell' = '%APPDATA%\Seashell\Seashell.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Seashell' = '%APPDATA%\Seashell\Seashell.exe'
- '%APPDATA%\Seashell\csrss.exe' -keyhide -prochide 2944 -reg %APPDATA%\Seashell\Seashell.exe -proc 2944 %APPDATA%\Seashell\Seashell.exe
- '%APPDATA%\Seashell\Seashell.exe'
- '%APPDATA%\Injector (Halloween).exe'
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- C:\Halloween event exploit 2014.dll
- %APPDATA%\Seashell\csrss.exe
- %APPDATA%\Injector (Halloween).exe
- %APPDATA%\Seashell\Seashell.exe
- %APPDATA%\Seashell\csrss.exe
- 'aj#####123.no-ip.biz':25565
- DNS ASK aj#####123.no-ip.biz
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''