Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{E601124V-561J-NFNY-73W7-4F2AI25YS03U}] 'StubPath' = '%APPDATA%\svchost.exe\lol Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{E601124V-561J-NFNY-73W7-4F2AI25YS03U}] 'StubPath' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'Policies' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- %WINDIR%\Explorer.EXE
- %APPDATA%\%USERNAME%-wchelper.dll
- %APPDATA%\88E6680F\ak.tmp
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%7
- %TEMP%\wupp.pgg
- %TEMP%\aut1.tmp
- %TEMP%\%USERNAME%2.txt
- %APPDATA%\svchost.exe\lol
- %APPDATA%\%USERNAME%-wchelper.dll
- %APPDATA%\svchost.exe\lol
- <Полный путь к вирусу>
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\aut1.tmp
- %TEMP%\%USERNAME%2.txt
- 'sl####eh.zapto.org':3014
- DNS ASK sl####eh.zapto.org
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'