Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ggwab' = '%PROGRAM_FILES%\Outlook Express\ggwab.exe'
- '%PROGRAM_FILES%\Windows NT\etdialer.exe'
- '%PROGRAM_FILES%\Outlook Express\ggwab.exe'
- '%TEMP%\inbegin.exe'
- '<SYSTEM32>\cmd.exe' /c %TEMP%\selill.bat
- '<SYSTEM32>\attrib.exe' -a -r -s -h "%TEMP%\inbegin.exe"
- '<SYSTEM32>\cmd.exe' /c <Текущая директория>\selill.bat
- '<SYSTEM32>\attrib.exe' -a -r -s -h "<Полный путь к вирусу>"
- %PROGRAM_FILES%\Windows NT\etdialer.exe
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\temptxt.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1]
- %TEMP%\selill.bat
- C:\exeserfiles.txt
- <Текущая директория>\selill.bat
- %TEMP%\inbegin.exe
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\26bd78ae-2494-42cf-95fa-bd12d490df31
- %PROGRAM_FILES%\Outlook Express\ggwab.exe
- %TEMP%\temptxt.txt
- %TEMP%\inbegin.exe
- '74.##5.232.51':80
- 'localhost':1036
- 'localhost':1035
- 74.##5.232.51/
- DNS ASK www.google.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''