Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft_VsaVb' = '"%TEMP%\System.Messaging.exe"'
- %TEMP%\tmp1.tmp.exe <Полный путь к вирусу>
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES3.tmp" "%TEMP%\vbc2.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /noconfig @"%TEMP%\5wasbjey.cmdline"
- %TEMP%\RES3.tmp
- %TEMP%\vbc2.tmp
- %TEMP%\System.Messaging.exe
- %TEMP%\tmp1.tmp.exe
- %TEMP%\5wasbjey.0.vb
- <Текущая директория>\zCom.resources
- %TEMP%\5wasbjey.out
- %TEMP%\5wasbjey.cmdline
- %TEMP%\5wasbjey.cmdline
- %TEMP%\5wasbjey.0.vb
- <Текущая директория>\zCom.resources
- %TEMP%\RES3.tmp
- %TEMP%\vbc2.tmp
- %TEMP%\5wasbjey.out
- %TEMP%\tmp1.tmp.exe в %TEMP%\System.Messaging.exe
- 'me####rph.zapto.org':5151
- 'be##z.com':80
- 'wp#d':80
- be##z.com/IP.php
- wp#d/wpad.dat
- DNS ASK me####rph.zapto.org
- DNS ASK be##z.com
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''