Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Java' = '"%APPDATA%\crapted.exe"'
- %APPDATA%\Java.exe.exe
- %TEMP%\R9899RLJ6dM.exe /wrapper /dir=""%TEMP%\pkg_c92b1570"" /pproc="<Имя вируса>.exe"
- %TEMP%\bPTwqJ8YSm4jMJ.exe
- %TEMP%\pkg_c92b1570\autorun.txt
- %TEMP%\pkg_c92b1570\wrapper.xml
- %TEMP%\pkg_c92b1570\timings.txt
- %TEMP%\pkg_c92b1570\detectionrules.dat
- %TEMP%\pkg_c92b1570\R9899RLJ6dM.log
- %TEMP%\R9899RLJ6dM.exe
- %TEMP%\bPTwqJ8YSm4jMJ.exe
- %APPDATA%\crapted.exe
- %TEMP%\pkg_c92b1570\stub.log
- %APPDATA%\Java.exe.exe
- 'dl.###talliq.com':80
- 'om####.no-ip.biz':333
- 'localhost':1036
- dl.###talliq.com/api/detectionrequest.aspx?ke#####################################
- DNS ASK dl.###talliq.com
- DNS ASK om####.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''