Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'volumebear' = '%APPDATA%\Roaming\Volume-hunt\volume_cow.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'volumebear' = '%APPDATA%\Roaming\Volume-hunt\volume_cow.exe'
- '<SYSTEM32>\attrib.exe' -r -s -h "<Полный путь к вирусу>"
- '<SYSTEM32>\ping.exe'
- <SYSTEM32>\ping.exe
- %TEMP%\611A585D.bat
- %TEMP%\~84d67047.tmp
- %APPDATA%\Roaming\Volume-hunt\volume_cow.exe
- %APPDATA%\Roaming\Volume-hunt\volume_cow.exe
- DNS ASK pa#####ance-relief.com
- DNS ASK do#####ndle-land.com
- DNS ASK to#####ece-action.com
- DNS ASK dn#.##ftncsi.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''