Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Connections' = '<Полный путь к вирусу>'
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://ww##.sowdo.com/post.asp?sC#############
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\post[1].asp
- <Текущая директория>\visita64.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\post[1].asp
- 'ta#.e-3.cn':80
- 'localhost':1039
- 'ww##.sowdo.com':80
- 'ju##.oiwin.cn':80
- ta#.e-3.cn/downini.asp
- ww##.sowdo.com/post.asp?sC#############
- ww##.sowdo.com/base.txt
- ju##.oiwin.cn/downini6.asp
- DNS ASK ta#.e-3.cn
- DNS ASK ju##.oiwin.cn
- DNS ASK ww##.sowdo.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '#32770' WindowName: '??????????????????'
- ClassName: '' WindowName: '??????????????????'
- ClassName: 'TEXE' WindowName: 'EXEtitle'
- ClassName: 'TWEB' WindowName: 'Windowtitle'