Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{86T50IMJ-7QMM-74UO-H82G-OVNC0X6Q41BM}] 'StubPath' = '<SYSTEM32>\Internet Explorer\iupdates.exe Restart'
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{86T50IMJ-7QMM-74UO-H82G-OVNC0X6Q41BM}] 'StubPath' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'system32.exe' = '%WINDIR%'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- <SYSTEM32>\Internet Explorer\iupdates.exe
- <SYSTEM32>\svchost.exe
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\sqlite3[1].dll
- %TEMP%\%USERNAME%8
- %APPDATA%\%USERNAME%3SQLite3.dll
- %TEMP%\119218.tmp
- %TEMP%\%USERNAME%2.txt
- <SYSTEM32>\Internet Explorer\iupdates.exe
- %TEMP%\%USERNAME%7
- %APPDATA%\%USERNAME%log.dat
- %APPDATA%\%USERNAME%log.dat
- <SYSTEM32>\Internet Explorer\iupdates.exe
- <Полный путь к вирусу>
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- 'cy####at.no-ip.org':1337
- 'te#####n.fileave.com':80
- 'localhost':1036
- te#####n.fileave.com/MYT/sqlite3.dll
- DNS ASK cy####at.no-ip.org
- DNS ASK te#####n.fileave.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''