Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run] 'bin' = '%APPDATA%\popo.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run] 'bin' = '%APPDATA%\popo.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'bin' = '%APPDATA%\popo.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'bin' = '%APPDATA%\popo.exe'
- '<SYSTEM32>\regsvr32.exe' "<Текущая директория>\MSWINSCK.OCX" /s
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\ddos[1].bss
- <Текущая директория>\MSWINSCK.OCX
- %TEMP%\popo.exe.jpg
- %APPDATA%\dsds.dat
- из <Полный путь к вирусу> в %APPDATA%\popo.exe
- 'localhost':1039
- 'ju######.dyndns-home.com':80
- ju######.dyndns-home.com/hola/dos.php?ke#######################
- ju######.dyndns-home.com/hola/plugins/ddos.bss
- ju######.dyndns-home.com/hola/cmd.php?ke#######################
- ju######.dyndns-home.com/hola/alive.php?ke#############################################################################
- ju######.dyndns-home.com/hola/fg.php?ke#########
- DNS ASK ju######.dyndns-home.com
- ClassName: 'Indicator' WindowName: '(null)'