Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Windows Updater' = '<Полный путь к вирусу>'
- '%TEMP%\iepv.exe' /stext %TEMP%\iepv.txt
- '%TEMP%\ChromePass.exe' /stext %TEMP%\ChromePass.txt
- '%TEMP%\dialup.exe' /stext %TEMP%\data.txt
- '%TEMP%\mspass.exe' /stext %TEMP%\mess.txt
- [<HKLM>\Software\Mirabilis\ICQ\NewOwners]
- [<HKCU>\Software\Yahoo\Pager]
- [<HKCU>\Software\AIM\AIMPRO]
- [<HKCU>\Software\Paltalk]
- [<HKCU>\Software\Google\Google Talk\Accounts]
- [<HKCU>\Software\Mirabilis\ICQ\NewOwners]
- [<HKCU>\Software\America Online\AIM6\Passwords]
- [<HKCU>\Software\Microsoft\MSNMessenger]
- [<HKLM>\Software\Miranda]
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian]
- [<HKCU>\Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users]
- [<HKCU>\Software\Microsoft\IdentityCRL]
- [<HKCU>\Software\Microsoft\MessengerService]
- %TEMP%\ChromePass.exe
- %TEMP%\ChromePass.txt
- %TEMP%\-%USERNAME%11-Jun-2014.txt
- %TEMP%\iepv.exe
- %TEMP%\dialup.exe
- %TEMP%\data.txt
- %TEMP%\mspass.exe
- 'ft#.#rivehq.com':21
- 'wp#d':80
- wp#d/wpad.dat
- DNS ASK ft#.#rivehq.com
- DNS ASK wp#d