Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\oobe\winlogon.exe'
- скрытых файлов
- расширений файлов
- [<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = 'Microsoft Internet Explorer'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\background[1].jpg
- %WINDIR%\system\winlogon.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\tad[1].jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\tad[1].jpg
- %WINDIR%\mui\ga2.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\right[1].gif
- <SYSTEM32>\hookdll.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\background[1].jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\right[1].gif
- из <Полный путь к вирусу> в <SYSTEM32>\oobe\winlogon.exe
- 'ww###.websamba.com':80
- 'mu###dl.t35.com':80
- 'localhost':1037
- ww###.websamba.com/vnupload/img/background.jpg
- mu###dl.t35.com/img/tad.jpg
- ww###.websamba.com/vnupload/img/tad.jpg
- mu###dl.t35.com/img/right.gif
- ww###.websamba.com/vnupload/img/right.gif
- mu###dl.t35.com/img/background.jpg
- DNS ASK ww###.websamba.com
- DNS ASK mu###dl.t35.com