Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'msgsinit' = '<SYSTEM32>\msgs.exe'
- <SYSTEM32>\msgs.exe
- <SYSTEM32>\msginit.exe
- <SYSTEM32>\attrib.exe -a -r -s -h "<Полный путь к вирусу>"
- <SYSTEM32>\cmd.exe /c <SYSTEM32>\tempDel.bat
- <SYSTEM32>\rundll32.exe <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen <Текущая директория>\cutehallow231.gif
- %HOMEPATH%\Recent\cutehallow231.lnk
- <SYSTEM32>\tempDel.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\184.22.241[1]
- %HOMEPATH%\Recent\af32d3b0.lnk
- <SYSTEM32>\halloween.txt
- <SYSTEM32>\msginit.exe
- <SYSTEM32>\msgs.exe
- <Текущая директория>\cutehallow231.gif
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\184.22.241[1]
- '18#.#2.241.4':80
- 'bl##.##rustalive.com':80
- 18#.#2.241.4/
- bl##.##rustalive.com/
- DNS ASK bl##.##rustalive.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: ''