Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'uberkk' = '%HOMEPATH%/ratatax/<Имя вируса>.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\index[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\index[1].htm
- %HOMEPATH%\ratatax\key
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\whatismyipaddress[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\index[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\index[1].htm
- из <Полный путь к вирусу> в %HOMEPATH%\ratatax\<Имя вируса>.exe
- 'localhost':80
- 'wh#####yipaddress.com':80
- wh#####yipaddress.com/
- DNS ASK wh#####yipaddress.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'