Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'OEZFNzY1Q0FBNjFCQ0JGMU' = '%HOMEPATH%\p2pgpowe.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%HOMEPATH%\p2pgpowe.exe'
- %HOMEPATH%\Start Menu\Programs\Startup\<Имя вируса>.exe
- %APPDATA%\672057.exe
- %APPDATA%\931403.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\yov5xrd4.cmdline"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES4.tmp" "%TEMP%\vbc3.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\8f0zzytn.cmdline"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\vbc1.tmp"
- %TEMP%\yov5xrd4.out
- %TEMP%\yov5xrd4.cmdline
- %TEMP%\yov5xrd4.0.vb
- %APPDATA%\672057.exe
- %TEMP%\RES4.tmp
- %TEMP%\vbc3.tmp
- %TEMP%\8f0zzytn.out
- %TEMP%\8f0zzytn.cmdline
- %TEMP%\8f0zzytn.0.vb
- %APPDATA%\931403.exe
- %TEMP%\RES2.tmp
- %TEMP%\vbc1.tmp
- %TEMP%\vbc3.tmp
- %TEMP%\RES4.tmp
- %TEMP%\yov5xrd4.cmdline
- %TEMP%\yov5xrd4.0.vb
- %TEMP%\yov5xrd4.out
- %TEMP%\vbc1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\8f0zzytn.0.vb
- %TEMP%\8f0zzytn.cmdline
- %TEMP%\8f0zzytn.out
- из <Полный путь к вирусу> в %HOMEPATH%\p2pgpowe.exe
- 'os###.alaal.biz':31090
- 'ap#.##pmania.com':80
- 'wp#d':80
- ap#.##pmania.com/
- wp#d/wpad.dat
- DNS ASK os###.alaal.biz
- DNS ASK ap#.##pmania.com
- DNS ASK wp#d