Техническая информация
- '<Полный путь к вирусу>:del'
- '<SYSTEM32>\rundll32.exe' %TEMP%\svitetr\spmpokp\wow.dll,0
- %WINDIR%\Explorer.EXE
- %TEMP%\svitetr\spmpokp\wow.dll
- %APPDATA%\Microsoft\SystemCertificates\My\Certificates\DFD2CBDFA223E381031027282F04090CAD84EF68
- %TEMP%\svitetr\spmpokp\wow.ini
- <Полный путь к вирусу>:del
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5.1.2600_2[1].0_32
- C:\System Volume Information\EFS0.LOG
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\39dc67dc-a89f-493a-a2ee-f547f23574a3
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\5ac38088fb2b984c79df1d8bc847fe70_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\svitetr\spmpokp\wow.dll
- C:\System Volume Information\EFS0.LOG
- '74.##5.232.51':80
- 'gl###lmost.com':80
- 'localhost':1037
- '18#.#65.232.20':80
- 18#.#65.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/061/23ef5514-3059-436f-a4a7-4cefaab20eb1/5.1.2600_2.0_32
- DNS ASK un###rsaly.com
- DNS ASK gl###lmost.com
- DNS ASK google.com
- ClassName: 'djfsfs;dlgkfds' WindowName: 'fre;woitijgl;fd'
- ClassName: 'fdghdfrhg' WindowName: '(null)'