Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'B39.exe' = '%PROGRAM_FILES%\LP\75D8\B39.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'cBtzA1ivDo4HsJf' = '%APPDATA%\dwme.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'PmGsJ7d8gZhwOtc8234A' = '<SYSTEM32>\AV Protection 2011v121.exe'
- <SYSTEM32>\AV Protection 2011v121.exe Protection 2011v121.exe 5985<Полный путь к вирусу>
- %APPDATA%\dwme.exe auto
- %TEMP%\dwme.exe
- %HOMEPATH%\Start Menu\Programs\AV Protection 2011\AV Protection 2011.lnk
- %APPDATA%\BycA1ivD3n4msJf\AV Protection 2011.ico
- %PROGRAM_FILES%\LP\75D8\B39.exe
- %HOMEPATH%\Desktop\AV Protection 2011.lnk
- %TEMP%\dwme.exe
- <SYSTEM32>\AV Protection 2011v121.exe
- %APPDATA%\ldr.ini
- %APPDATA%\dwme.exe
- 'pi####ewonline.com':80
- '46.#.179.109':80
- pi####ewonline.com/sp.php?ad############
- 46.#.179.109/
- DNS ASK pi####ewonline.com
- '<IP-адрес в локальной сети>':1037
- ClassName: 'Shell_TrayWnd' WindowName: ''