Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'u2cnn2iy8n' = '%PROGRAM_FILES%\Microsoft Svchost Service\svchost.exe'
- %PROGRAM_FILES%\Microsoft Svchost Service\svchost.exe
- C:\Server.exe
- <SYSTEM32>\cmd.exe /c ""C:\Kill.bat" "
- <SYSTEM32>\attrib.exe "C:\Server.exe" -h -r -s
- <SYSTEM32>\notepad.exe C:\№«·бѕЯµї»зАМЖ®.txt
- <SYSTEM32>\netsh.exe advfirewall firewall add rule name="System Thread" protocol=TCP dir =out action=allow
- ClassName: 'gdkWindowToplevel' WindowName: ''
- %PROGRAM_FILES%\Microsoft Svchost Service\svchost.exe
- C:\Kill.bat
- C:\№«·бѕЯµї»зАМЖ®.txt
- C:\Server.exe
- %TEMP%\~DFC11.tmp
- 'ar######linedns.no-ip.org':9999
- 'al####9.codns.com':1900
- DNS ASK ar######linedns.no-ip.org
- DNS ASK al####9.codns.com
- ClassName: '' WindowName: '??? ??'
- ClassName: '' WindowName: 'Process Viewer'
- ClassName: 'TnetstatMain' WindowName: ''
- ClassName: 'ConsoleWindowClass' WindowName: ''
- ClassName: 'RegEdit_RegEdit' WindowName: ''
- ClassName: '' WindowName: 'Windows ?? ???'
- ClassName: '' WindowName: '<SYSTEM32>\taskmgr.exe'
- ClassName: 'TfMain' WindowName: ''
- ClassName: '' WindowName: 'Microsoft Thread Control'
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ProcessHacker' WindowName: ''
- ClassName: '' WindowName: 'ProcNetMonitor - www.SecurityXploded.com'
- ClassName: 'PROCEXPL' WindowName: ''
- ClassName: 'SocketSniff' WindowName: ''