Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\ХХЖ¬] 'Start' = '00000002'
- %PROGRAM_FILES%\Windows Work\ХХЖ¬.exe 1
- <SYSTEM32>\services.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\544208301[1].html
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Test[1].html
- %PROGRAM_FILES%\Windows Work\TmpХХЖ¬.exe.dat
- %WINDIR%\Temp\TMP1.tmp
- %PROGRAM_FILES%\Windows Work\ХХЖ¬.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Test[1].html
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\544208301[1].html
- %PROGRAM_FILES%\Windows Work\ХХЖ¬.exe
- из <Полный путь к вирусу> в %TEMP%\141453.dat
- 'www.my##hn.com':80
- 'www.ne##ing.com':80
- '20#.#6.232.182':80
- www.my##hn.com/root/RedGirl/IP/544208301.html
- www.my##hn.com/root/RedGirl/IP/Test.html
- www.ne##ing.com/root/RedGirl/IP/544208301.html
- www.ne##ing.com/root/RedGirl/IP/Test.html
- DNS ASK www.ne##ing.com
- DNS ASK www.my##hn.com
- DNS ASK www.microsoft.com
- '<IP-адрес в локальной сети>':1036
- ClassName: 'Shell_TrayWnd' WindowName: ''