Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ntojiyzmj4k9soljx7k2r9nkza8ytwdunz' = '<SYSTEM32>\dkhvlowd.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ntojiyzmj4k9soljx7k2r9nkza8ytwdunz' = '<SYSTEM32>\dkhvlowd.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'ntojiyzmj4k9soljx7k2r9nkza8ytwdunz' = '<SYSTEM32>\dkhvlowd.exe'
- '<SYSTEM32>\dkhvlowd.exe'
- '<SYSTEM32>\attrib.exe' "<Полный путь к вирусу>" -h -r -s
- '<SYSTEM32>\cmd.exe' /c <Текущая директория>\wmz8xe1ctkv627s.bat
- <Полный путь к вирусу>
- <SYSTEM32>\dkhvlowd.exe
- <Текущая директория>\wmz8xe1ctkv627s.bat
- <SYSTEM32>\dkhvlowd.exe
- <SYSTEM32>\MSWINSCK.ocx
- <SYSTEM32>\dkhvlowd.exe
- 'g1###.tistory.com':80
- '<IP-адрес в локальной сети>':2015
- 'localhost':1037
- 'pd###.egloos.com':80
- pd###.egloos.com/pds/201501/19/49/DS021dffa.jpg
- DNS ASK g1###.tistory.com
- DNS ASK pd###.egloos.com
- ClassName: '' WindowName: '?? ? ?? ?? ??'
- ClassName: '' WindowName: '?????'
- ClassName: '' WindowName: '???? ?? ?? ??'
- ClassName: '' WindowName: 'dkhvlowd.exe ??'
- ClassName: '' WindowName: 'dkhvlowd.exe ?? ??'
- ClassName: '' WindowName: '??? ?? - ??'
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: '??? ?? ??? ?? ???'
- ClassName: '' WindowName: '??? ??'
- ClassName: '' WindowName: '??? ?? ??? ??'