Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\qmgrxp.exe,'
- <SYSTEM32>\dllcache\beep.sys файлом <SYSTEM32>\dllcache\beep.sys.new
- <DRIVERS>\beep.sys файлом %TEMP%\beep.sys
- %TEMP%\Del1.tmp 64 "<Полный путь к вирусу>"
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\qmgrxp.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\CRNJEUFU-680f[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\CRNJEUFU-680f[1]
- %TEMP%\Del1.tmp
- %TEMP%\beep.sys
- <SYSTEM32>\qmgr64.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\CRNJEUFU-680f[1]
- <DRIVERS>\beep.sys.new в <DRIVERS>\beep.sys
- 'ms#.##ypetm.com.tw':80
- 'ms#.##ypetm.com.tw':443
- 'ne#.###antecs.com.tw':80
- 'ne#.###antecs.com.tw':443
- ms#.##ypetm.com.tw/FC001/CRNJEUFU-680f
- ne#.###antecs.com.tw/FC001/CRNJEUFU-680f
- DNS ASK ms#.##ypetm.com.tw
- DNS ASK ne#.###antecs.com.tw