Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'vcowg' = 'rundll32.exe "%APPDATA%\vcowg.dll",ProcessBatch'
- '<SYSTEM32>\rundll32.exe' "%APPDATA%\vcowg.dll",ProcessBatch
- %APPDATA%\apect.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\fid=BwCbAAEAGvQCAAEFCBcAAAAAAAAAAAAAAAAAAACTDQQICwAAAF-5xTviEeWgrLh0giZvmW8GwGNRAABVVVVVVVVVVVVVVVVVVVVVBZzPAUgUc8Ia9AIAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZ[1]
- %APPDATA%\vcowg.dll
- '12#####.##n147.fileshostingetc.com':80
- 12#####.##n147.fileshostingetc.com/upload/fid=BwCbAAEAGvQCAAEFCBcAAAAAAAAAAAAAAAAAAACTDQQICwAAAF-5xTviEeWgrLh0giZvmW8GwGNRAABVVVVVVVVVVVVVVVVVVVVVBZzPAUgUc8Ia9AIAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZO9YAAAAAAAAQcAAAAHAAAANFYA
- DNS ASK 12#####.##n147.fileshostingetc.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'