Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'Shell' = '%APPDATA%\lsass.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'Shell' = '%APPDATA%\<Имя вируса>.exe'
- %HOMEPATH%\Start Menu\Programs\Startup\lsass.exe
- '%HOMEPATH%\Start Menu\Programs\Startup\lsass.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\tmp.bat""
- '<SYSTEM32>\wscript.exe' "%TEMP%\1.vbs"
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\cscript.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\ctfmon.exe
- %APPDATA%\lsass.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\news[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\news[1].htm
- %TEMP%\1.vbs
- %TEMP%\tmp.bat
- %APPDATA%\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\news[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\news[1].htm
- %TEMP%\1.vbs
- 'gr###a21.com':80
- DNS ASK gr###a21.com