Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\Wussirvcs] 'Start' = '00000002'
- %ALLUSERSPROFILE%\Xonroivoz.exe
- C:\ёЈЅЁ3Ў¶50Ў·.txt..exe
- <SYSTEM32>\cmd.exe /c "c:\ёЈЅЁ3Ў¶50Ў·.txt..exe_And DeleteMe.bat"
- %TEMP%\_eviip.tmp
- %TEMP%\BClib\krnln.fnr
- <Полный путь к вирусу>
- C:\ёЈЅЁ3Ў¶50Ў·.txt..exe_And DeleteMe.bat
- %TEMP%\BClib\krnln.fne
- %PROGRAM_FILES%\Wussirvcs\srvany.exe
- %TEMP%\BClib\dp1.fne
- %TEMP%\BClib\Exmlrpc.fne
- %TEMP%\E_4\krnln.fnr
- %TEMP%\E_4\Exmlrpc.fne
- C:\ёЈЅЁ3Ў¶50Ў·.txt..exe
- %TEMP%\nsf2.tmp\System.dll
- %ALLUSERSPROFILE%\Xonroivoz.dll
- %WINDIR%\Fonts\49d42b9a7081d9014141132c50669229.dat
- %TEMP%\E_4\dp1.fne
- %ALLUSERSPROFILE%\Xonroivoz.exe
- %ALLUSERSPROFILE%\Xonroivoz.dll
- %ALLUSERSPROFILE%\Xonroivoz.exe
- %ALLUSERSPROFILE%\Xonroivoz.dll
- %TEMP%\nsf2.tmp\System.dll
- 'q1#####369.gnway.net':19820
- DNS ASK q1#####369.gnway.net
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''