Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- %HOMEPATH%\Start Menu\Programs\Startup\svhost.exe
- %TEMP%\IXP000.TMP\INSTAL~1.EXE /wrapper /dir="%TEMP%\pkg_1417e2ce0" /pproc="dmw.exe"
- %TEMP%\IXP000.TMP\INSTAL~1.EXE
- %TEMP%\dmw.exe
- %TEMP%\pkg_1417e2ce0\timings.txt
- %TEMP%\pkg_1417e2ce0\autorun.txt
- %TEMP%\pkg_1417e2ce0\INSTAL~1.log
- %TEMP%\pkg_1417e2ce0\detectionrules.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index_skinny[1].html
- %TEMP%\IXP000.TMP\INSTAL~1.EXE
- %TEMP%\dmw.exe
- %TEMP%\IXP000.TMP\dmw.exe
- %TEMP%\pkg_1417e2ce0\wrapper.xml
- %TEMP%\pkg_1417e2ce0\stub.log
- <Полный путь к вирусу>
- 'dl.###talliq.com':80
- 'in#####er.freeze.com':80
- 'localhost':1036
- dl.###talliq.com/api/detectionrequest.aspx?ke#####################################
- in#####er.freeze.com/initialization_screen/index_skinny.html
- DNS ASK dl.###talliq.com
- DNS ASK in#####er.freeze.com
- '<IP-адрес в локальной сети>':1037
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''