Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'uotreyyyl' = '<Полный путь к вирусу>'
- <Текущая директория>\uasunts.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\uasunts[1].txt
- <Текущая директория>\uenvia.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\uenvia[1].txt
- <Текущая директория>\uliskloads.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\uliskloads[1].txt
- <Текущая директория>\umsgter.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\umsgter[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\uenvia[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\uasunts[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\umsgter[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\uliskloads[1].txt
- 'www.ap#####erciltdauoou.com':80
- 'localhost':1035
- www.ap#####erciltdauoou.com/uollnew/uasunts.txt
- www.ap#####erciltdauoou.com/uollnew/uenvia.txt
- www.ap#####erciltdauoou.com/uollnew/uliskloads.txt
- www.ap#####erciltdauoou.com/uollnew/umsgter.txt
- DNS ASK www.ap#####erciltdauoou.com
- ClassName: 'NDDEAgnt' WindowName: 'NetDDE Agent'
- ClassName: 'Shell_TrayWnd' WindowName: ''