Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ASDSvc.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\restrict.exe] 'Debugger' = 'services.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\oifdask13kljfaio\Parameters] 'ServiceDll' = '<SYSTEM32>\120250.dll'
- [<HKLM>\SYSTEM\ControlSet001\Services\oifdask13kljfaio] 'ImagePath' = '<SYSTEM32>\svchost.exe -k "oifdask13kljfaio"'
- [<HKLM>\SYSTEM\ControlSet001\Services\oifdask13kljfaio] 'Start' = '00000002'
- '<SYSTEM32>\ping.exe' 0
- '<SYSTEM32>\cmd.exe' /c ping 0 & del <Полный путь к вирусу> > nul
- '<SYSTEM32>\svchost.exe' -k "oifdask13kljfaio"
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\polo13[1].txt
- <SYSTEM32>\120250.dll
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\polo13[1].txt
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\polo13[1].txt
- 'sp####nv8.vicp.cc':82
- 'bs####s085.oicp.net':82
- 'jy#####bqrk26.oicp.net':80
- http://jy#####bqrk26.oicp.net/ip/polo13.txt
- DNS ASK sp####nv8.vicp.cc
- DNS ASK bs####s085.oicp.net
- DNS ASK jy#####bqrk26.oicp.net