Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'B39.exe' = '%PROGRAM_FILES%\LP\75D8\B39.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'YS2ibF3paJdKR9T' = '%APPDATA%\dwme.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ov2onamJ7E8ZjC8234A' = '<SYSTEM32>\Cloud AV 2012v121.exe'
- <SYSTEM32>\Cloud AV 2012v121.exe AV 2012v121.exe 5985<Полный путь к вирусу>
- %PROGRAM_FILES%\LP\75D8\1.tmp
- %TEMP%\dwme.exe
- %APPDATA%\dwme.exe auto
- %PROGRAM_FILES%\LP\75D8\1.tmp
- %PROGRAM_FILES%\LP\75D8\B39.exe
- %HOMEPATH%\Start Menu\Programs\Cloud AV 2012\Cloud AV 2012.lnk
- %HOMEPATH%\Desktop\Cloud AV 2012.lnk
- %APPDATA%\88E66\680F.8E6
- %APPDATA%\Y4pmG5sdERqYwUr\Cloud AV 2012.ico
- %TEMP%\dwme.exe
- <SYSTEM32>\Cloud AV 2012v121.exe
- %APPDATA%\dwme.exe
- %APPDATA%\ahst.lni
- 'pi####ewonline.com':80
- '21#.#24.122.156':80
- pi####ewonline.com/sp.php?sn########################
- 21#.#24.122.156/
- DNS ASK pi####ewonline.com
- '<IP-адрес в локальной сети>':1037
- ClassName: 'Shell_TrayWnd' WindowName: ''