Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] '26639' = '%ALLUSERSPROFILE%\Local Settings\Temp\msbxfvoaz.pif'
- '%TEMP%\server.exe'
- '<SYSTEM32>\attrib.exe' +h +s Server.exe
- '<SYSTEM32>\wuauclt.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\1.tmp\Botnet.Specail.code.bat" "
- '<SYSTEM32>\attrib.exe' +h +s facebook.exe
- <SYSTEM32>\wuauclt.exe
- %TEMP%\rok.txt
- %ALLUSERSPROFILE%\Local Settings\Temp\msbxfvoaz.pif
- %TEMP%\server.exe
- %TEMP%\1.tmp\Botnet.Specail.code.bat
- %TEMP%\1.tmp\server.exe
- %TEMP%\1.tmp\server.exe
- %TEMP%\server.exe
- 'my####00.comule.com':80
- '20#.#6.232.182':80
- my####00.comule.com/Panel/image.php
- DNS ASK my####00.comule.com
- DNS ASK www.up####.microsoft.com