Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%TEMP%\FolderN\name.exe'
- скрытых файлов
- '%TEMP%\notepad.exe' -f "%TEMP%\Web.txt"
- '%TEMP%\notepad.exe' -f "%TEMP%\Mail.txt"
- '%TEMP%\notepad.exe'
- '%CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE' -x -s 1728
- '<SYSTEM32>\cmd.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%TEMP%\FolderN\name.exe" /f
- [<HKCU>\Software\Microsoft\Internet Account Manager\Accounts]
- [<HKCU>\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts]
- %TEMP%\Web.txt
- %TEMP%\Mail.txt
- %TEMP%\2FB3E.dmp
- %TEMP%\dw.log
- %TEMP%\notepad.exe
- %TEMP%\FolderN\name.exe
- %APPDATA%\pidloc.txt
- %APPDATA%\pid.txt
- %TEMP%\Web.txt
- %TEMP%\Mail.txt
- 'ch####p.dyndns.org':80
- 'wp#d':80
- http://ch####p.dyndns.org/
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK ch####p.dyndns.org
- DNS ASK wp#d
- ClassName: 'Shell_TrayWnd' WindowName: ''