Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'LAKFJGKGGK96868hfhghgjAJDHGHGKGHKGHKGHFHFF' = '%ALLUSERSPROFILE%\Application Data\Windowss.exe'
- скрытых файлов
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' -f "%TEMP%\holdermail.txt"
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %TEMP%\acct.jpg
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "LAKFJGKGGK96868hfhghgjAJDHGHGKGHKGHKGHFHFF" /t REG_SZ /d "%ALLUSERSPROFILE%\Application Data\Windowss.exe"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- [<HKCU>\Software\Paltalk]
- [<HKCU>\Software\Google\Google Talk\Accounts]
- %APPDATA%\pidloc.txt
- %TEMP%\holdermail.txt
- %TEMP%\acct.jpg
- %APPDATA%\pid.txt
- %TEMP%\holdermail.txt
- из <Полный путь к вирусу> в %ALLUSERSPROFILE%\Application Data\Windowss.exe
- 'ma##.#dimyapii.com':587
- 'wh#####yipaddress.com':80
- 'wp#d':80
- wh#####yipaddress.com/
- wp#d/wpad.dat
- DNS ASK ma##.#dimyapii.com
- DNS ASK wh#####yipaddress.com
- DNS ASK wp#d
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''