Техническая информация
- '<Полный путь к вирусу>:del'
- '<SYSTEM32>\rundll32.exe' %TEMP%\seqxylp\spphoix\wow.dll,0
- %WINDIR%\Explorer.EXE
- %TEMP%\seqxylp\spphoix\wow.dll
- %APPDATA%\Microsoft\SystemCertificates\My\Certificates\6E3BE4654DA17C51E7C44FCDA8B85147CE4E84B8
- %TEMP%\seqxylp\spphoix\wow.ini
- <Полный путь к вирусу>:del
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5.1.2600_2[1].0_32
- C:\System Volume Information\EFS0.LOG
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\d2c941a7-11b2-49dc-8ca2-6a1633cb8fd5
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\3b38f3428e76eb63d9ee06cc37aa192c_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\seqxylp\spphoix\wow.dll
- C:\System Volume Information\EFS0.LOG
- '74.##5.232.51':80
- 'gl###lmost.com':80
- 'localhost':1038
- '18#.#65.232.20':80
- 18#.#65.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/071/23ef5514-3059-436f-a4a7-4cefaab20eb1/5.1.2600_2.0_32
- DNS ASK un###rsaly.com
- DNS ASK gl###lmost.com
- DNS ASK google.com
- ClassName: 'dsjgfdskjghgdf' WindowName: 'fljdslgjdskgjd'