Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] '26639' = '%ALLUSERSPROFILE%\Local Settings\Temp\msnopi.com'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Vhostd.dll' = '"<Полный путь к вирусу>'
- '%APPDATA%\dropperr.exe'
- '<SYSTEM32>\wuauclt.exe'
- <SYSTEM32>\wuauclt.exe
- %TEMP%\2F7A4.dmp
- %ALLUSERSPROFILE%\Local Settings\Temp\msnopi.com
- %APPDATA%\dropperr.exe
- %TEMP%\dw.log
- %APPDATA%\dropperr.exe
- '91.##4.104.190':80
- '20#.#6.232.182':80
- 91.##4.104.190/one/image.php
- DNS ASK www.up####.microsoft.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'