Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Smite God Selector' = '%TEMP%\explorer.exe.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = 'explorer.exe,%TEMP%\explorer.exe.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Smite God Selector" /t REG_SZ /d "%TEMP%\explorer.exe.exe
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"%TEMP%\explorer.exe.exe"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- %TEMP%\2FFF1.dmp
- %TEMP%\dw.log
- %TEMP%\explorer.exe.exe
- <Полный путь к вирусу>
- '13#####ioh.no-ip.biz':1604
- DNS ASK 13#####ioh.no-ip.biz
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'