Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'yhwyzuuf' = '"%APPDATA%\Etbiny\guyde.exe"'
- '%APPDATA%\Etbiny\guyde.exe' -r
- '<SYSTEM32>\cmd.exe' /c del <Полный путь к вирусу> >> NUL if exist <Полный путь к вирусу> goto repeat
- '%WINDIR%\explorer.exe'
- '%WINDIR%\NOTEPAD.EXE'
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\dwwin.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\ctfmon.exe
- [<HKCU>\SOFTWARE\martin prikryl\winscp 2\sessions]
- [<HKLM>\SOFTWARE\martin prikryl\winscp 2\sessions]
- [<HKCU>\SOFTWARE\ftpware\coreftp\sites]
- [<HKCU>\SOFTWARE\Ghisler\Total Commander]
- [<HKCU>\SOFTWARE\Far\Plugins\ftp\hosts]
- [<HKCU>\SOFTWARE\Far2\Plugins\ftp\hosts]
- %APPDATA%\Etbiny\guyde.exe
- DNS ASK su###money.pw
- ClassName: 'Indicator' WindowName: ''