Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] ',ml;;;;;oioji' = '%APPDATA%\MyFolder\,ml;;;;;oioji.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'OTlFQUYwNEJBREQ3QjM4Rj' = '%HOMEPATH%\lusrdsa.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%HOMEPATH%\lusrdsa.exe'
- <SYSTEM32>\wscript.exe "%APPDATA%\MyFolder\tmp2.vbs" 0
- %APPDATA%\MyFolder\tmp2.vbs
- %APPDATA%\MyFolder\,ml;;;;;oioji.ram
- %APPDATA%\MyFolder\tmp2.vbs
- из <Полный путь к вирусу> в %HOMEPATH%\lusrdsa.exe
- 'xt######igital-network.info':7200
- 'xt######igital-chat.info':7200
- 'wp#d':80
- 'ap#.##pmania.com':80
- ap#.##pmania.com/
- wp#d/wpad.dat
- DNS ASK xt######igital-network.info
- DNS ASK xt######igital-chat.info
- DNS ASK wp#d
- DNS ASK ap#.##pmania.com
- ClassName: 'Indicator' WindowName: ''