Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'volumebear' = '%APPDATA%\Roaming\Volume-ask\volumeexercise.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'volumebear' = '%APPDATA%\Roaming\Volume-ask\volumeexercise.exe'
- '<SYSTEM32>\attrib.exe' -r -s -h "<Полный путь к вирусу>"
- '<SYSTEM32>\typeperf.exe'
- <SYSTEM32>\typeperf.exe
- %TEMP%\~84d67047.tmp
- %APPDATA%\Roaming\Volume-ask\volumeexercise.exe
- %TEMP%\683C6A50.bat
- %APPDATA%\Roaming\Volume-ask\volumeexercise.exe
- DNS ASK ar####ite-tune.com
- DNS ASK am####on-lawyer.com
- DNS ASK at######une-temperature.com
- DNS ASK as####mentrent.com
- DNS ASK dn#.##ftncsi.com
- DNS ASK ab####y-counter.com
- DNS ASK ai#####wake-money.com
- DNS ASK ac####nt-muscle.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''