Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '<SYSTEM32>\A3F2.exe'
- <SYSTEM32>\A3F2.exe
- <SYSTEM32>\C94B.exe -bb
- <SYSTEM32>\cmd.exe /c "<SYSTEM32>\A3F2tmp.bat"
- <SYSTEM32>\cmd.exe /c "<Текущая директория>\<Имя вируса>tmp.bat"
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\list[1].4548025
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\online[1].6445019
- <SYSTEM32>\A3F2tmp.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\online[1].2654703
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\list[1].1988164
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\online[1].8000635
- <SYSTEM32>\A3F2.exe
- <SYSTEM32>\C94B.exe
- <SYSTEM32>\MSWINSCK.OCX
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\list[1].8865595
- <Текущая директория>\<Имя вируса>tmp.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\online[1].4132655
- <SYSTEM32>\C94B.exe
- '22#.#04.249.240':80
- 'localhost':1035
- 22#.#04.249.240/n1//list/?s=############################
- 22#.#04.249.240/n1//online/?s=############################################################################