Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'security' = '%TEMP%\svhost.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%TEMP%\security\$security.exe'
- '%TEMP%\rundll.exe'
- '%TEMP%\svhost.exe'
- '%TEMP%\security\$security.exe'
- '<SYSTEM32>\cmd.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%TEMP%\security\$security.exe" /f
- %TEMP%\security\$security.exe
- %TEMP%\security\melt.bat
- %TEMP%\svhost.exe
- %TEMP%\rundll.exe
- <Полный путь к вирусу>
- %TEMP%\svhost.exe
- 'so######2000.duckdns.org':1119
- DNS ASK so######2000.duckdns.org
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''