Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = 'Explorer.exe,HCH.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = 'Explorer.exe,HCH.exe'
- <SYSTEM32>\legacy.exe
- <SYSTEM32>\7z.exe e -y drm.7z -p{tigger} a drm.7z <Имя вируса>.exe -p{tigger}
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\v3data[1].exe
- %TEMP%\sysroot.exe
- %WINDIR%\inf\drm.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\v3data[2].exe
- <SYSTEM32>\legacy.exe
- <SYSTEM32>\7z.exe
- %TEMP%\aut1.tmp
- %TEMP%\aut2.tmp
- <SYSTEM32>\drm.7z
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\v3data[1].exe
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- 'ol.##2639.com':80
- ol.##2639.com/v3data.exe
- DNS ASK ol.##2639.com
- DNS ASK www.google.com