Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '8jTC4zfbwU1yh9r' = '%APPDATA%\EMEd749Bi23a0FT.exe'
- %APPDATA%\%USERNAME%-wchelper.dll
- %APPDATA%\88E6680F\ak.tmp
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%2.txt
- %TEMP%\dggekoi
- %TEMP%\aut1.tmp
- %TEMP%\cylaogc
- %TEMP%\aut2.tmp
- %APPDATA%\%USERNAME%-wchelper.dll
- %TEMP%\%USERNAME%2.txt
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\cylaogc
- %TEMP%\aut1.tmp
- %TEMP%\dggekoi
- %TEMP%\aut2.tmp
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%7
- из <Полный путь к файлу> в %APPDATA%\EMEd749Bi23a0FT.exe
- 'wi#####7trojan.ddns.net':501
- DNS ASK wi#####7trojan.ddns.net