Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'f56327edeaa2fbb15f8b87350ee349b7' = '"%APPDATA%\server.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'f56327edeaa2fbb15f8b87350ee349b7' = '"%APPDATA%\server.exe" ..'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%APPDATA%\server.exe' = '%APPDATA%\server.exe:*:Enabled:server.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%APPDATA%\server.exe" "server.exe" ENABLE
- '%APPDATA%\server.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' -nohome
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\google[1]
- %APPDATA%\server.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1]
- %APPDATA%\server.exe
- <Полный путь к вирусу>
- 'localhost':1040
- 'ma####bm.ddns.net':5552
- 'localhost':1037
- '74.##5.232.51':80
- http://www.google.com/ via 74.##5.232.51
- DNS ASK ma####bm.ddns.net
- DNS ASK www.google.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'IEFrame' WindowName: ''