Техническая информация
- '<Полный путь к вирусу>:del'
- '<SYSTEM32>\rundll32.exe' %TEMP%\siqhpmp\smdbwts\wow.dll,0
- %WINDIR%\Explorer.EXE
- %TEMP%\siqhpmp\smdbwts\wow.dll
- %APPDATA%\Microsoft\SystemCertificates\My\Certificates\E7C6115B4A995485470C62BD086641BE61E26627
- %TEMP%\siqhpmp\smdbwts\wow.ini
- <Полный путь к вирусу>:del
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5.1.2600_2[1].0_32
- C:\System Volume Information\EFS0.LOG
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\5e5e999e-215b-4e9b-ad62-2718d18205fb
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\d3bbc61be9c025c2794e201b9517130c_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\siqhpmp\smdbwts\wow.dll
- C:\System Volume Information\EFS0.LOG
- '74.##5.232.51':80
- 'gl###lmost.com':80
- 'localhost':1036
- '18#.#65.232.20':80
- 18#.#65.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/080/23ef5514-3059-436f-a4a7-4cefaab20eb1/5.1.2600_2.0_32
- DNS ASK un###rsaly.com
- DNS ASK gl###lmost.com
- DNS ASK google.com
- ClassName: 'dsjgfdskjghgdf' WindowName: 'fljdslgjdskgjd'