Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'uapmf' = 'rundll32.exe "%APPDATA%\uapmf.dll",AGetDevice'
- <SYSTEM32>\rundll32.exe "%APPDATA%\uapmf.dll",AGetDevice
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\fid=BwCRAAEAJ4EDAAEFCBcAAAAAAAAAAAAAAAAAAABjDQMHCwAAAJakM4riEe-HrLhzgiZvmW_m3zlRAABVVVVVVVVVVVVVVVVVVVVV8bDNASbKK-8ngQMAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZ[1]
- %APPDATA%\nuiror.dll
- %APPDATA%\uapmf.dll
- '11#####.##n99.fileshostingetc.com':80
- 11#####.##n99.fileshostingetc.com/upload/fid=BwCRAAEAJ4EDAAEFCBcAAAAAAAAAAAAAAAAAAABjDQMHCwAAAJakM4riEe-HrLhzgiZvmW_m3zlRAABVVVVVVVVVVVVVVVVVVVVV8bDNASbKK-8ngQMAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZO9YAAAAAAAAQcAAAAHAAAANFYA
- DNS ASK 11#####.##n99.fileshostingetc.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''