Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ajyWlxBiFK.exe' = '"%TEMP%\ajyWlxBiFK.exe"'
- "%TEMP%\tmpE838.tmp.exe" (загружен из сети Интернет)
- %WINDIR%\Explorer.EXE
- %TEMP%\125078.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\440-direct[1].exe
- %TEMP%\tmpE838.tmp.exe
- %TEMP%\ajyWlxBiFK.exe
- %TEMP%\XPUAbBynvb.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\readdatagateway[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\readdatagateway[1].php
- из <Полный путь к вирусу> в %TEMP%\tmp1.tmp
- 'se###hafter.org':80
- 'se#####indestimate.org':80
- se###hafter.org/any5/440-direct.exe
- se#####indestimate.org/readdatagateway.php?ty#######################################
- se#####indestimate.org/readdatagateway.php?ty####################################
- DNS ASK se###hafter.org
- DNS ASK se#####indestimate.org
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''