Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- '%TEMP%\Trojan.exe'
- '<LS_APPDATA>jpnBy_lqJl.exe'
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shell32.dll,OpenAs_RunDLL <LS_APPDATA>SaIGClb_Na.الحماية من الاختراق
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\sc.exe' start w32time task_started
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe
- C:\ProgramData\Microsoft\RAC\Temp\sqlBBA0.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBC1E.tmp
- <LS_APPDATA>jpnBy_lqJl.exe
- <LS_APPDATA>SaIGClb_Na.الحماية من الاختراق
- %TEMP%\Trojan.exe
- C:\ProgramData\Microsoft\RAC\Temp\sqlBBA0.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBC1E.tmp
- 'al####ae.no-ip.biz':1177
- DNS ASK ti##.#indows.com
- DNS ASK dn#.##ftncsi.com
- DNS ASK al####ae.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'OleMainThreadWndClass' WindowName: '(null)'