Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '69d51f3fb56c1ebf1e2a8d2453106573' = '"%TEMP%\Server.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '69d51f3fb56c1ebf1e2a8d2453106573' = '"%TEMP%\Server.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'e5a9ed9865566182cd0d27ec63ce3828' = '%TEMP%\Microsoft\svchost.exe'
- скрытых файлов
- '%TEMP%\frd.exe'
- '%PROGRAM_FILES%\Java\jre8\launch4j-tmp\frd.exe' -Xms32m -Xmx128m -jar "%TEMP%\frd.jar"
- '%TEMP%\Server.exe'
- '%TEMP%\WorM.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Server.exe" "Server.exe" ENABLE
- %TEMP%\Microsoft\svchost.exe
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
- %TEMP%\BlackData.dat
- %PROGRAM_FILES%\Java\jre8\launch4j-tmp\frd.exe
- %TEMP%\Server.exe
- %TEMP%\WorM.exe
- %TEMP%\frd.exe
- %TEMP%\BlackData.dat
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
- %TEMP%\Microsoft\svchost.exe
- DNS ASK dn#.##ftncsi.com
- DNS ASK fa######hrrad84.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''