Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'JyCPKPKVVGxIjfKyDdBZUotQ' = '%APPDATA%\ONEtAjBajuFaNN.exe'
- <SYSTEM32>\svchost.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:"%TEMP%\RES2.tmp"" ""%TEMP%\vbc1.tmp""
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\xx3eovvc.cmdline"
- ccapp.exe
- %TEMP%\vbc1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\xx3eovvc.dll
- %TEMP%\xx3eovvc.out
- %APPDATA%\ONEtAjBajuFaNN.exe
- %TEMP%\xx3eovvc.0.vb
- %TEMP%\xx3eovvc.cmdline
- %TEMP%\xx3eovvc.cmdline
- %TEMP%\xx3eovvc.dll
- %TEMP%\xx3eovvc.out
- %TEMP%\RES2.tmp
- %TEMP%\vbc1.tmp
- %TEMP%\xx3eovvc.0.vb
- из <Полный путь к вирусу> в %TEMP%\tmpG15.tmp
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'VMDragDetectWndClass' WindowName: ''