Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Corporation eiHdYDLVMZEDQRNe' = '%APPDATA%\eiHdYDLVMZEDQRNe.exe'
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe'
- '%APPDATA%\scvhost.exe' /m"<Полный путь к вирусу>"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
- %APPDATA%\eiHdYDLVMZEDQRNe.exe
- %APPDATA%\eiHdYDLVMZEDQRNe.exe:Zone.Identifier
- %APPDATA%\scvhost.exe
- %APPDATA%\scvhost.exe:Zone.Identifier
- %APPDATA%\scvhost.exe
- %APPDATA%\eiHdYDLVMZEDQRNe.exe
- 'sm###andfly.pw':443
- 'ip##pi.com':80
- 'wp#d':80
- http://ip##pi.com/json
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK sm###andfly.pw
- DNS ASK ip##pi.com
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''