Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'MjYxMzgxRkMxNzU0ODlEMz' = '%HOMEPATH%\odbcc_1.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%HOMEPATH%\odbcc_1.exe'
- из <Полный путь к вирусу> в %HOMEPATH%\odbcc_1.exe
- '4t##emo.com':5632
- 'an####ya.no-ip.org':5632
- 'wp#d':80
- 'ap#.##pmania.com':80
- ap#.##pmania.com/
- wp#d/wpad.dat
- DNS ASK 4t##emo.com
- DNS ASK an####ya.no-ip.org
- DNS ASK wp#d
- DNS ASK ap#.##pmania.com