Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ASDSvc.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\restrict.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\ogisfkls15fuioa] 'Start' = '00000002'
- '<SYSTEM32>\cmd.exe' /c choice /t 1 /d y /n & del <Полный путь к вирусу> > nul
- '<SYSTEM32>\cmd.exe' /c del <Полный путь к вирусу>
- '<SYSTEM32>\svchost.exe' -k "ogisfkls15fuioa"
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\polo15[1].txt
- <SYSTEM32>\129562.dll
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\polo15[1].txt
- 'yz####ybj1.oicp.net':82
- 'wg#####seqe365.vicp.cc':82
- 'ei#####ggx42.vicp.cc':80
- http://ei#####ggx42.vicp.cc/ip/polo15.txt
- DNS ASK yz####ybj1.oicp.net
- DNS ASK wg#####seqe365.vicp.cc
- DNS ASK ei#####ggx42.vicp.cc