Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] '26639' = '%ALLUSERSPROFILE%\Local Settings\Temp\msimla.cmd'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '841250' = '%TEMP%\841250\svhost.exe'
- Диспетчера задач (Taskmgr)
- <SYSTEM32>\wuauclt.exe
- <SYSTEM32>\taskkill.exe /f /im mshta.exe
- <SYSTEM32>\mshta.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\wuauclt.exe
- %TEMP%\841250\svhost.exe
- %ALLUSERSPROFILE%\Local Settings\Temp\msimla.cmd
- C:\<Имя вируса>.exe
- %TEMP%\disable.txt
- %TEMP%\once.txt
- %TEMP%\841250\svhost.exe
- 'f5#.#apto.org':80
- '20#.#6.232.182':80
- f5#.#apto.org/aaa/image.php
- DNS ASK f5#.#apto.org
- DNS ASK www.up####.microsoft.com
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''