Техническая информация
- [<HKLM>\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command] '' = '"<Полный путь к вирусу>" -a "%PROGRAM_FILES%\Internet Explorer\iexplore.exe"'
- %TEMP%\0oc15vs4857u3gk833i58623uxbjp5351
- %HOMEPATH%\Templates\0oc15vs4857u3gk833i58623uxbjp5351
- <LS_APPDATA>\0oc15vs4857u3gk833i58623uxbjp5351
- %ALLUSERSPROFILE%\Application Data\0oc15vs4857u3gk833i58623uxbjp5351
- 'ko###uwuko.com':80
- 'wo####bakuxak.com':80
- 'ru###iloz.com':80
- 'la###ijyr.com':80
- 'gu####nasetyr.com':80
- 'bu###yqej.com':80
- 'xa####jigonako.com':80
- 'wa###ajyqak.com':80
- 'qi####zeficu.com':80
- 'ma###omydo.com':80
- 'bu###ysiqub.com':80
- 'wa####dekesix.com':80
- 'ci###ybabyh.com':80
- DNS ASK ko###uwuko.com
- DNS ASK wo####bakuxak.com
- DNS ASK ru###iloz.com
- DNS ASK la###ijyr.com
- DNS ASK gu####nasetyr.com
- DNS ASK bu###yqej.com
- DNS ASK xa####jigonako.com
- DNS ASK wa###ajyqak.com
- DNS ASK qi####zeficu.com
- DNS ASK ma###omydo.com
- DNS ASK wa####dekesix.com
- DNS ASK bu###ysiqub.com
- DNS ASK ci###ybabyh.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'msascui_class' WindowName: ''