Техническая информация
- скрытых файлов
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext "%TEMP%\holderwb.txt"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext "%TEMP%\holdermail.txt"
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- [<HKCU>\Software\Yahoo\Pager]
- [<HKCU>\Software\Microsoft\IdentityCRL]
- [<HKCU>\Software\Microsoft\MessengerService]
- [<HKCU>\Software\Google\Google Talk\Accounts]
- [<HKCU>\Software\Microsoft\MSNMessenger]
- %APPDATA%\pidloc.txt
- %TEMP%\holdermail.txt
- %TEMP%\holderwb.txt
- %APPDATA%\pid.txt
- %TEMP%\aut1.tmp
- %TEMP%\gLn74Ut.FV4
- C:\<Имя вируса>.exe
- %TEMP%\gLn74Ut.FV4
- %TEMP%\holdermail.txt
- %TEMP%\holderwb.txt
- %TEMP%\aut1.tmp
- %TEMP%\gLn74Ut.FV4
- 'he###fex.net':21
- 'wh#####yipaddress.com':80
- 'wp#d':80
- wh#####yipaddress.com/
- wp#d/wpad.dat
- DNS ASK he###fex.net
- DNS ASK wh#####yipaddress.com
- DNS ASK wp#d