Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{46LYK4BF-05U5-F5N7-2036-IN3RMTL66R5Q}] 'StubPath' = '%PROGRAM_FILES%\install\server.exe Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{46LYK4BF-05U5-F5N7-2036-IN3RMTL66R5Q}] 'StubPath' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost.exe' = '"%TEMP%\svchost.exe"'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- %PROGRAM_FILES%\install\server.exe
- <SYSTEM32>\svchost.exe
- %WINDIR%\Explorer.EXE
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %PROGRAM_FILES%\install\server.exe
- %TEMP%\%USERNAME%2.txt
- %PROGRAM_FILES%\install\server.exe
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- из <Полный путь к вирусу> в %TEMP%\svchost.exe
- 'te#####tlol.no-ip.biz':100
- DNS ASK te#####tlol.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''