Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'conime' = '<SYSTEM32>\efxego.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = '<SYSTEM32>\winlog_ufeepd.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
- '<SYSTEM32>\netsh.exe' firewall set opmode disable
- '<SYSTEM32>\net1.exe' stop alg
- '<SYSTEM32>\cmd.exe' /c ""<SYSTEM32>\tmp.cmd" "
- '<SYSTEM32>\net.exe' stop alg
- <SYSTEM32>\system32.LOG
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\ic[1].asp
- <SYSTEM32>\tmp.cmd
- <SYSTEM32>\tmp.cmd
- %TEMP%\~DF1214.tmp
- из <Полный путь к вирусу> в <SYSTEM32>\winlog_ufeepd.exe
- 'if####.ip138.com':80
- '21#.#3.205.226':8383
- 'ip.##ar520.com':81
- 'localhost':1035
- '21#.#3.205.226':8888
- if####.ip138.com/ic.asp
- DNS ASK if####.ip138.com
- DNS ASK ip.##ar520.com
- ClassName: '(null)' WindowName: '(null)'