Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'wmpnetvk' = '%TEMP%\Microsoft\Protect\Credentials\\wmpnetvk.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft® Windows® Operating System' = '%TEMP%\Microsoft\Protect\Credentials\rundll.exe'
- %TEMP%\Microsoft\Protect\Credentials\rundll.exe
- %TEMP%\Microsoft\Protect\Credentials\wmpnetvk.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:"%TEMP%\RES2.tmp"" ""%TEMP%\vbc1.tmp""
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\ee3xaujl.cmdline"
- %TEMP%\%USERNAME%7
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\Microsoft\Protect\Credentials\wmpnetvk.exe
- %TEMP%\Microsoft\Protect\Credentials\wmpnetvk.exe:ZONE.identifier
- %TEMP%\Microsoft\Protect\Credentials\rundll.exe:ZONE.identifier
- %TEMP%\%USERNAME%8
- %TEMP%\RES2.tmp
- %TEMP%\ee3xaujl.cmdline
- %TEMP%\ee3xaujl.0.vb
- %TEMP%\Microsoft\Protect\Credentials\xCocaine.txt
- %TEMP%\%USERNAME%2.txt
- %TEMP%\vbc1.tmp
- %TEMP%\ee3xaujl.out
- %TEMP%\Microsoft\Protect\Credentials\rundll.exe
- %APPDATA%\%USERNAME%log.dat
- <Полный путь к вирусу>
- %TEMP%\%USERNAME%2.txt
- %TEMP%\ee3xaujl.cmdline
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\vbc1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\ee3xaujl.out
- %TEMP%\ee3xaujl.0.vb
- 'vi####ape.no-ip.biz':81
- DNS ASK vi####ape.no-ip.biz
- ClassName: 'Indicator' WindowName: ''