Техническая информация
- [<HKLM>\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command] '' = '"<Полный путь к вирусу>" -a "%PROGRAM_FILES%\Internet Explorer\iexplore.exe"'
- %TEMP%\b44nt18twyn1i07ksq1wimqq31822hdnq
- %HOMEPATH%\Templates\b44nt18twyn1i07ksq1wimqq31822hdnq
- <LS_APPDATA>\b44nt18twyn1i07ksq1wimqq31822hdnq
- %ALLUSERSPROFILE%\Application Data\b44nt18twyn1i07ksq1wimqq31822hdnq
- 'la###ijyr.com':80
- 'wa###ajyqak.com':80
- 'ma###omydo.com':80
- 'wa####dekesix.com':80
- 'bu###ysiqub.com':80
- 'wo####bakuxak.com':80
- 'ci###ybabyh.com':80
- 'xa####jigonako.com':80
- 'ko###uwuko.com':80
- 'ru###iloz.com':80
- DNS ASK wa####dekesix.com
- DNS ASK ma###omydo.com
- DNS ASK bu###ysiqub.com
- DNS ASK gu####nasetyr.com
- DNS ASK microsoft.com
- DNS ASK bu###yqej.com
- DNS ASK qi####zeficu.com
- DNS ASK xa####jigonako.com
- DNS ASK wo####bakuxak.com
- DNS ASK ci###ybabyh.com
- DNS ASK ru###iloz.com
- DNS ASK la###ijyr.com
- DNS ASK wa###ajyqak.com
- DNS ASK ko###uwuko.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'msascui_class' WindowName: '(null)'