Техническая информация
- '<Полный путь к вирусу>:del'
- '<SYSTEM32>\rundll32.exe' %TEMP%\svpfhqo\sfgqxph\wow.dll,0
- %WINDIR%\Explorer.EXE
- %TEMP%\svpfhqo\sfgqxph\wow.dll
- %APPDATA%\Microsoft\SystemCertificates\My\Certificates\1FBF0301D81820E77F72FB62250B084021367BC0
- %TEMP%\svpfhqo\sfgqxph\wow.ini
- <Полный путь к вирусу>:del
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5.1.2600_2[1].0_32
- C:\System Volume Information\EFS0.LOG
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\f9c2b391-2be8-4fd7-8ab7-6da6012df257
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\c6cb39c156a16413883fd28d5979f7b9_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\svpfhqo\sfgqxph\wow.dll
- C:\System Volume Information\EFS0.LOG
- '74.##5.232.51':80
- 'so##gen.com':80
- 'localhost':1036
- '18#.#65.232.20':80
- 18#.#65.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/050/23ef5514-3059-436f-a4a7-4cefaab20eb1/5.1.2600_2.0_32
- DNS ASK so##gen.com
- DNS ASK kr##eon.com
- DNS ASK google.com
- ClassName: 'rfetorewutireu' WindowName: 'dfreitfpojglfd'