Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Windows Media' = '<SYSTEM32>\WmInit.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\WmInit.exe' = '<SYSTEM32>\WmInit.exe:*:Enabled:Microsoft Windows Media'
- <SYSTEM32>\WmInit.exe "<Полный путь к вирусу>"
- AVP.COM
- %APPDATA%\Microsoft\CryptnetUrlCache\MetaData\3C83474D61E624A4F9844DF935AFE217
- %APPDATA%\Microsoft\CryptnetUrlCache\Content\3C83474D61E624A4F9844DF935AFE217
- <SYSTEM32>\WmInit.dat
- <SYSTEM32>\WmInit.exe
- 'tr###5511.com':55101
- '11#.#42.116.46':55107
- '11#.#42.116.46':55102
- '11#.#42.116.46':55109
- '11#.#42.116.46':55100
- 'ad###91020.info':55109
- '11#.#42.116.46':55104
- '11#.#42.116.46':55108
- '11#.#42.116.46':55105
- '11#.#42.116.46':55101
- '11#.#42.116.46':55103
- '11#.#42.116.46':55106
- 'ms###17253.info':55100
- 'ph###57910.info':55102
- 'te###26374.info':7900
- 'wp#d':80
- '20#.#6.232.182':80
- 20#.#6.232.182/pki/crl/products/WindowsPCA.crl
- wp#d/wpad.dat
- DNS ASK te###26374.info
- DNS ASK tr###5511.com
- DNS ASK ad###91020.info
- DNS ASK ph###57910.info
- DNS ASK ms###17253.info
- DNS ASK wp#d
- DNS ASK crl.microsoft.com
- ClassName: 'SysListView32' WindowName: ''