Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'tiwc' = '<SYSTEM32>\run691.exe dummy'
- <SYSTEM32>\upd537.exe (загружен из сети Интернет)
- <SYSTEM32>\run691.exe <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ioo[1].exe
- <SYSTEM32>\upd537.exe
- <SYSTEM32>\run691.exe
- <SYSTEM32>\ldr447.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ioo[1].exe
- '19#.#25.177.38':80
- 19#.#25.177.38/rnrdnew/ioo.exe
- ClassName: '' WindowName: 'Hidden Process Requests Network Access'
- ClassName: '' WindowName: 'Warning: some components changed'
- ClassName: '' WindowName: 'Create rule for IEXPLORE.EXE'
- ClassName: '' WindowName: 'Windows Security Alert'
- ClassName: '' WindowName: 'Warning: Components Have Changed'
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''