Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ausras' = 'rundll32.exe "%APPDATA%\ausras.dll",HrStreamSeekSet'
- %APPDATA%\dacet.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\id=BgBgAAEA-OMDAAEFCBcAAAAAAAAAAAAAAAAAAAAlDAgCCwAAANGGlcnhERHdrLhwgiZvmW9qNRtQAABVVVVVVVVVVVVVVVVVVVVV7rDNAVS5Wgv44wMAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZO[1]
- %APPDATA%\ausras.dll
- '11#####.##n37.yourfreeupload.com':80
- 11#####.##n37.yourfreeupload.com/file/id=BgBgAAEA-OMDAAEFCBcAAAAAAAAAAAAAAAAAAAAlDAgCCwAAANGGlcnhERHdrLhwgiZvmW9qNRtQAABVVVVVVVVVVVVVVVVVVVVV7rDNAVS5Wgv44wMAVlRRXF5TQlh_Z3d0a2d4anoGAQK-kSInYZO9YAAAAAAAATRW&rt=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- DNS ASK 11#####.##n37.yourfreeupload.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''