Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'VMware Tools' = '%PROGRAM_FILES%\VMware\VMware Tools\VMwareTray.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'VMware User Process' = '%PROGRAM_FILES%\VMware\VMware Tools\VMwareUser.exe'
- <Служебный элемент>
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Имя вируса>' = '<Полный путь к вирусу>'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] '<Имя вируса>' = '<Полный путь к вирусу>'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'MSSOAPRSoap1.02.814.0' = '%CommonProgramFiles%\mssoap\binaries\resources\1033\mssoaprsoap1.02.814.0.exe'
- %CommonProgramFiles%\MSSoap\Binaries\Resources\1033\RCX1.tmp
- <Служебный элемент>
- %CommonProgramFiles%\MSSoap\Binaries\Resources\1033\MSSOAPRSoap1.02.814.0.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\windowsupdate.microsoft[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\getfile[1].php
- <Служебный элемент>
- %CommonProgramFiles%\MSSoap\Binaries\Resources\1033\MSSOAPRSoap1.02.814.0.exe
- 'co####rslocal.com':80
- '20#.#6.232.182':80
- co####rslocal.com/getfile.php?r=#################################################################################################
- 20#.#6.232.182/
- DNS ASK co####rslocal.com
- DNS ASK windowsupdate.microsoft.com