Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%TEMP%\services\netwin.exe'
- '%TEMP%\svhost\svhost.exe'
- '%TEMP%\svhost.exe'
- '%APPDATA%\tmp.exe'
- '<SYSTEM32>\cmd.exe' /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "%APPDATA%\tmp.exe"
- '%TEMP%\tmp\tmp.exe'
- '<SYSTEM32>\ping.exe' 1.1.1.1 -n 1 -w 1000
- '<SYSTEM32>\cmd.exe' /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "%TEMP%\svhost.exe"
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%TEMP%\services\netwin.exe" /f
- '<SYSTEM32>\cmd.exe'
- '%TEMP%\services\netwin.exe'
- '%TEMP%\svhost.exe'
- %TEMP%\tmp\tmp.exe
- %TEMP%\.exe
- %APPDATA%\Imminent\Logs\12-07-2016
- %TEMP%\svhost\svhost.exe
- %APPDATA%\tmp.exe
- %TEMP%\services\netwin.exe
- %TEMP%\svhost.exe
- %TEMP%\ap.exe
- %TEMP%\services\melt.bat
- %TEMP%\tmp\tmp.exe
- <Полный путь к вирусу>
- 'se#####4.duckdns.org':5056
- DNS ASK se#####4.duckdns.org