Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'odifoquv' = '"%WINDIR%\ubijykqk.exe"'
- '%WINDIR%\explorer.exe'
- %WINDIR%\explorer.exe
- [<HKCU>\Software\Microsoft\Internet Account Manager]
- [<HKCU>\Software\Microsoft\Internet Account Manager\Accounts]
- %ALLUSERSPROFILE%\Application Data\ygogykagalulovyh\02000000
- %ALLUSERSPROFILE%\Application Data\ygogykagalulovyh\00000000
- %ALLUSERSPROFILE%\Application Data\ygogykagalulovyh\01000000
- %WINDIR%\ubijykqk.exe
- 'aj#####q.xuniyred.net':443
- 'ox###.xuniyred.net':443
- 'wl#####se.xuniyred.net':443
- 'tn####.xuniyred.net':443
- 'op#####ca.xuniyred.net':443
- 'ij#####du.xuniyred.net':443
- 'el###.xuniyred.net':443
- 'iq####.xuniyred.net':443
- DNS ASK aj#####q.xuniyred.net
- DNS ASK ox###.xuniyred.net
- DNS ASK wl#####se.xuniyred.net
- DNS ASK tn####.xuniyred.net
- DNS ASK op#####ca.xuniyred.net
- DNS ASK ij#####du.xuniyred.net
- DNS ASK el###.xuniyred.net
- DNS ASK iq####.xuniyred.net
- ClassName: 'Shell_TrayWnd' WindowName: ''