Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Rundll32.exe' = '%WINDIR%\system\svchost.exe'
- %WINDIR%\system\svchost.exe
- %TEMP%\144515.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\x3[1].txt
- %TEMP%\145515.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\SL6TKFAX\x4[1].txt
- %TEMP%\143515.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\12[1].txt
- %WINDIR%\system\svchost.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\22[1].txt
- %TEMP%\142515.tmp
- из <Полный путь к вирусу> в %TEMP%\141781.tmp
- 'www.ix##f.info':80
- 'www.je##l.info':80
- 'www.gw##j.info':80
- 'localhost':1035
- 'www.oo##h.info':80
- www.ix##f.info/gx/x3.txt
- www.je##l.info/gx2/x4.txt
- www.oo##h.info/xztj1/12.txt
- www.gw##j.info/xztj/22.txt
- DNS ASK www.ix##f.info
- DNS ASK www.je##l.info
- DNS ASK www.oo##h.info
- DNS ASK www.gw##j.info