Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '<SYSTEM32>\A3F2.exe'
- <SYSTEM32>\A3F2.exe
- <SYSTEM32>\C94B.exe -bb
- <SYSTEM32>\cmd.exe /c "<SYSTEM32>\A3F2tmp.bat"
- <SYSTEM32>\cmd.exe /c "<Текущая директория>\<Имя вируса>tmp.bat"
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\list[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\list[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\list[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\list[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\list[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\list[2]
- <SYSTEM32>\A3F2tmp.bat
- <SYSTEM32>\A3F2.exe
- <SYSTEM32>\C94B.exe
- <SYSTEM32>\MSWINSCK.OCX
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\list[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\online[1]
- <Текущая директория>\<Имя вируса>tmp.bat
- <SYSTEM32>\C94B.exe
- '21#.51.45.5':80
- 'localhost':1037
- 21#.51.45.5/0904//list/?s=###########################################################################################
- 21#.51.45.5/0904//online/?s=####################################################################################################################
- DNS ASK da##.alexa.com