Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'System' = '%APPDATA%\wuauctl.exe'
- Средство контроля пользовательских учетных записей (UAC)
- firefox.exe
- iexplore.exe
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Associations] 'LowRiskFileTypes' = '.exe;.com;.scr'
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\lp[1].php
- %APPDATA%\2.gif
- %APPDATA%\wuauctl.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\back01[1].png
- %APPDATA%\CRNJEUFU.jsp
- %APPDATA%\2.gif
- %APPDATA%\wuauctl.exe
- %APPDATA%\CRNJEUFU.jsp
- <SYSTEM32>\PerfStringBackup.TMP
- 'he#######lthandlifestyle.net':80
- 'cd#.###ridanetworkz.com':80
- he#######lthandlifestyle.net/wp-includes/pomo/dreams/lp.php?na#####################
- cd#.###ridanetworkz.com/images/back01.png
- DNS ASK he#######lthandlifestyle.net
- DNS ASK cd#.###ridanetworkz.com
- DNS ASK www.google.com
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'