Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Network balancing' = '%WINDIR%\svchost.exe'
- %WINDIR%\svchost.exe
- <SYSTEM32>\cmd.exe /c "%TEMP%\req26.bat"
- %WINDIR%\svcph.dll
- %APPDATA%\appmcs\app0x00.dat
- %APPDATA%\appmcs\sdt\tmp\y28.tmp
- %APPDATA%\appmcs\sdt\tmp\z29.tmp
- %APPDATA%\appmcs\sdt\advlg20110704_151625.dat
- %APPDATA%\appmcs\sdt\tmp\2C.tmp
- %APPDATA%\appmcs\sdt\tmp\2A.tmp
- %APPDATA%\appmcs\sdt\tmp\2B.tmp
- %APPDATA%\appmcs\sdt\tmp\z3.tmp
- <DRIVERS>\sysaiudor.sys
- %APPDATA%\appmcs\sdt\tmp\x1.tmp
- %APPDATA%\appmcs\sdt\tmp\y2.tmp
- %TEMP%\req26.bat
- %APPDATA%\appmcs\sdt\tmp\x27.tmp
- %WINDIR%\svchost.exe
- %WINDIR%\RCX25.tmp
- %WINDIR%\svcph.dll
- %WINDIR%\svchost.exe
- %APPDATA%\appmcs\sdt\tmp\2A.tmp
- %APPDATA%\appmcs\sdt\tmp\z29.tmp
- %APPDATA%\appmcs\sdt\tmp\2B.tmp
- %APPDATA%\appmcs\sdt\tmp\2C.tmp
- %APPDATA%\appmcs\sdt\tmp\txt.txt
- %APPDATA%\appmcs\sdt\tmp\y28.tmp
- %APPDATA%\appmcs\sdt\tmp\y2.tmp
- %APPDATA%\appmcs\sdt\tmp\x1.tmp
- %APPDATA%\appmcs\sdt\tmp\z3.tmp
- %APPDATA%\appmcs\sdt\tmp\x27.tmp
- %WINDIR%\svchost.exe
- из <Полный путь к вирусу> в <Текущая директория>\10005.tmp
- 'www.wh###smyip.com':80
- www.wh###smyip.com/automation/n09230945.asp
- DNS ASK www.wh###smyip.com
- ClassName: 'Indicator' WindowName: ''