Техническая информация
- [<HKLM>\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command] '' = '"<Полный путь к вирусу>" -a "%PROGRAM_FILES%\Internet Explorer\iexplore.exe"'
- %TEMP%\8ts42wj1421o2gi670s00884rhmtq6270
- %HOMEPATH%\Templates\8ts42wj1421o2gi670s00884rhmtq6270
- <LS_APPDATA>\8ts42wj1421o2gi670s00884rhmtq6270
- %ALLUSERSPROFILE%\Application Data\8ts42wj1421o2gi670s00884rhmtq6270
- 'xa####jigonako.com':80
- 'wa###ajyqak.com':80
- 'wo####bakuxak.com':80
- 'gu####nasetyr.com':80
- 'la###ijyr.com':80
- 'ru###iloz.com':80
- 'qi####zeficu.com':80
- DNS ASK ko###uwuko.com
- DNS ASK wa####dekesix.com
- DNS ASK bu###yqej.com
- DNS ASK microsoft.com
- DNS ASK bu###ysiqub.com
- DNS ASK ma###omydo.com
- DNS ASK wo####bakuxak.com
- DNS ASK qi####zeficu.com
- DNS ASK ru###iloz.com
- DNS ASK la###ijyr.com
- DNS ASK wa###ajyqak.com
- DNS ASK xa####jigonako.com
- DNS ASK gu####nasetyr.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'msascui_class' WindowName: ''