Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{462S0WP3-H4E4-51U4-EFKT-D27YVV2328C8}] 'StubPath' = '<SYSTEM32>\system\system.exe Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{462S0WP3-H4E4-51U4-EFKT-D27YVV2328C8}] 'StubPath' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'Policies' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- <SYSTEM32>\system\system.exe
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\spoolsv.exe
- <SYSTEM32>\alg.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\services.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\winlogon.exe
- System
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\smss.exe
- %TEMP%\XxX.xXx
- %TEMP%\UuU.uUu
- %APPDATA%\logs.dat
- <SYSTEM32>\system\system.exe
- %TEMP%\XX--XX--XX.txt
- %APPDATA%\logs.dat
- <SYSTEM32>\system\system.exe
- <Полный путь к вирусу>
- %TEMP%\XxX.xXx
- %TEMP%\UuU.uUu
- %TEMP%\XX--XX--XX.txt
- 'ki####ib.no-ip.biz':786
- DNS ASK ki####ib.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''