Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'explorer' = '%APPDATA%\Microsoft\Chrome.exe'
- %HOMEPATH%\Start Menu\Programs\Startup\Temp.exe
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext "%TEMP%\logmail.txt
- '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe' /stext "%TEMP%\logff.txt
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "explorer" /t REG_SZ /d "%APPDATA%\Microsoft\Chrome.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\vbc.exe
- [<HKCU>\Software\Yahoo\Pager]
- [<HKCU>\Software\Microsoft\IdentityCRL]
- [<HKCU>\Software\Microsoft\MessengerService]
- [<HKCU>\Software\Google\Google Talk\Accounts]
- [<HKCU>\Software\Microsoft\MSNMessenger]
- %TEMP%\logmail.txt
- %TEMP%\logff.txt
- %APPDATA%\Microsoft\Chrome.exe
- %TEMP%\logmail.txt
- %TEMP%\logff.txt
- из <Полный путь к вирусу> в %APPDATA%\Temp.exe
- 'www.li#####ssproducts.org':80
- 'wp#d':80
- wp#d/wpad.dat
- www.li#####ssproducts.org/Limitless/Login/submit_log.php
- DNS ASK www.li#####ssproducts.org
- DNS ASK wp#d
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'