Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '969a948993909ed19a879a' = '%APPDATA%\vloa.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\app[1].6
- из <Полный путь к вирусу> в %APPDATA%\vloa.exe
- 'localhost':1042
- 'ie###word.com':80
- 'p.###eyword.com':80
- 'ap#.##keyword.com':80
- p.###eyword.comhttp://p.iekeyword.com/receive/r_autoidcnt.asp?me########################################################
- ie###word.com/app/?pr##########################################################################
- p.###eyword.comhttp://p.iekeyword.com/receive/r_autoidcnt.asp?me################################################
- ap#.##keyword.comhttp://app.iekeyword.com/setup_b.asp?pr#############################
- DNS ASK ie###word.com
- DNS ASK ap#.##keyword.com
- DNS ASK p.###eyword.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Indicator' WindowName: ''