Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'volumebear' = '<LS_APPDATA>\Volumehesitate\volume-ought.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'volumebear' = '<LS_APPDATA>\Volumehesitate\volume-ought.exe'
- '<SYSTEM32>\attrib.exe' -r -s -h "<Полный путь к вирусу>"
- '<SYSTEM32>\rasdial.exe'
- <SYSTEM32>\rasdial.exe
- %TEMP%\~84d67047.tmp
- <LS_APPDATA>\Volumehesitate\volume-ought.exe
- %TEMP%\1C3AC98A.bat
- <LS_APPDATA>\Volumehesitate\volume-ought.exe
- DNS ASK ai#####wake-money.com
- DNS ASK am####on-lawyer.com
- DNS ASK ac####nt-muscle.com
- DNS ASK ab####y-counter.com
- DNS ASK dn#.##ftncsi.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''