Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'REQ4NjU2QTcwMjk1N0Y5OD' = '%HOMEPATH%\odbcmst.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%HOMEPATH%\odbcmst.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'dZJWvvX' = ''
- <SYSTEM32>\wscript.exe "%TEMP%\mcastemp.vbs"
- %TEMP%\mcastemp.vbs
- %APPDATA%\dZJWvvX.zgy
- %TEMP%\mcastemp.vbs
- из <Полный путь к вирусу> в %HOMEPATH%\odbcmst.exe
- 'ro###nimal.in':1988
- 'ap#.##pmania.com':80
- 'wp#d':80
- ap#.##pmania.com/
- wp#d/wpad.dat
- DNS ASK ro###nimal.in
- DNS ASK ap#.##pmania.com
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''