Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'b47767f992ce8624345aca182b76b202' = 'C:\ProgramData\Important.exe'
- %APPDATA%\Roaming\Microsoft\Protect\S-1-5-21-2832440558-3064306045-1455513625-1000\36a6633f-1744-4792-a27e-5f88b1eeb5c7
- \Device\Mup\BVNSEUHJ*\MAILSLOT\NET\NETLOGON
- <LS_APPDATA>\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol
- C:\ProgramData\Important.exe
- C:\ProgramData\Browsers.txt
- <SYSTEM32>\Microsoft\Protect\S-1-5-18\User\fb93132d-f7cc-402c-97c1-69f849b02346
- %TEMP%\bhvC189.tmp
- C:\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol
- C:\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\2F1A6504-0641-44CF-8BB5-3612D865F2E5.vsch
- C:\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\3CCD5499-87A8-4B10-A215-608888DD3B55.vsch
- %TEMP%\bhvC189.tmp
- DNS ASK dn#.##ftncsi.com
- DNS ASK re#####ctionplayerz.biz
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''