Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '<Имя вируса>.exe' = '%APPDATA%\<Имя вируса>.exe'
- <SYSTEM32>\system\instance.exe
- %APPDATA%\lshss.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:"%TEMP%\RES2.tmp"" "%TEMP%\CSC1.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\_6dnxjuw.cmdline"
- %TEMP%\%USERNAME%2.txt
- %TEMP%\dw.log
- <SYSTEM32>\system\instance.exe
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\21CF4.dmp
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%7
- %APPDATA%\<Имя вируса>.exe
- %TEMP%\_6dnxjuw.cmdline
- %TEMP%\_6dnxjuw.0.cs
- %APPDATA%\lshss.exe
- %TEMP%\_6dnxjuw.out
- %TEMP%\_6dnxjuw.dll
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\%USERNAME%2.txt
- %TEMP%\_6dnxjuw.dll
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\_6dnxjuw.out
- %TEMP%\CSC1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\_6dnxjuw.0.cs
- %TEMP%\_6dnxjuw.cmdline
- 'ig####ts.zapto.org':1900
- DNS ASK ig####ts.zapto.org
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''