Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '26d305e757c43a69761b9fd16264540e' = '"%TEMP%\Process Hacker 2.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '26d305e757c43a69761b9fd16264540e' = '"%TEMP%\Process Hacker 2.exe" ..'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\Process Hacker 2.exe' = '%TEMP%\Process Hacker 2.exe:*:Enabled:Process Hacker 2.exe'
- '%TEMP%\Process Hacker 2.exe'
- '%HOMEPATH%\Local Settings\Tempserver.exe'
- '<LS_APPDATA>UUbrLISaa_.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Process Hacker 2.exe" "Process Hacker 2.exe" ENABLE
- <LS_APPDATA>\IsolatedStorage\fqfmqdqq.eqd\03vgbi0l.u0m\Url.5onwpfvub4v44rwizch0i455ojp1jwus\AssemFiles\91EF1739\Usages.bin
- %TEMP%\Process Hacker 2.exe
- %HOMEPATH%\Local Settings\Tempserver.exe
- <LS_APPDATA>xPCZUKVnpG.,exe
- <LS_APPDATA>UUbrLISaa_.exe
- <LS_APPDATA>\IsolatedStorage\fqfmqdqq.eqd\03vgbi0l.u0m\Url.5onwpfvub4v44rwizch0i455ojp1jwus\info.dat
- <LS_APPDATA>\IsolatedStorage\fqfmqdqq.eqd\03vgbi0l.u0m\Url.5onwpfvub4v44rwizch0i455ojp1jwus\identity.dat
- 'sa.##-ip.biz':1177
- DNS ASK sa.##-ip.biz
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''