Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'userinit' = '<SYSTEM32>\userinit.exe,%WINDIR%\apppatch\xguwuqo.dat,'
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\cscript.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\news[1].htm
- %WINDIR%\Temp\3.tmp
- %WINDIR%\Temp\2.tmp
- %WINDIR%\AppPatch\xguwuqo.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\home[1].htm
- %WINDIR%\Temp\3.tmp
- %WINDIR%\Temp\2.tmp
- из <Полный путь к вирусу> в %TEMP%\1.tmp
- 'bl####uiltiness.com':80
- 'www.bing.com':80
- bl####uiltiness.com/news.php
- bl####uiltiness.com/home.php
- DNS ASK bl####uiltiness.com
- DNS ASK www.bing.com
- ClassName: '____AVP.Root' WindowName: ''
- ClassName: '???????,???????????B?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????' WindowName: ''
- ClassName: '???????????????????????????????????????????????2??????????????????????????r???????????????????????????????????????????????????a???????????????????????????????? ????????? ?????????????????????????????? ????????????????????????????????????????????$?????????????????????????????????$????????????????????????? ????????????' WindowName: ''