Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = 'explorer.exe,"C:\ProgramData\394098\sysmon.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'System Monitor' = '"C:\ProgramData\394098\sysmon.exe"'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = 'userinit.exe,"<SYSTEM32>\clientsvr.exe"'
- 'C:\ProgramData\394098\sysmon.exe'
- '<SYSTEM32>\PING.EXE' 127.0.0.1 -n 10
- <SYSTEM32>\svchost.exe
- %TEMP%\211CFDC.tmp
- <SYSTEM32>\clientsvr.exe
- C:\ProgramData\394098\sysmon.exe
- %TEMP%\79173A9.tmp
- C:\ProgramData\47fa08765bf4a72b8c965e87572abba09b09f7dc
- C:\ProgramData\394098\sysmon.exe
- C:\ProgramData\47fa08765bf4a72b8c965e87572abba09b09f7dc
- %TEMP%\211CFDC.tmp
- %TEMP%\79173A9.tmp
- из <Полный путь к вирусу> в %TEMP%\8079
- DNS ASK dn#.##ftncsi.com
- DNS ASK q5#.#o-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''