Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Mix' = '%APPDATA%\microsoft\svchost.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\result[2].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\result[2].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\result[2].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\result[2].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\result[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\result[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\result[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\result[1].htm
- из <Полный путь к вирусу> в %APPDATA%\Microsoft\svchost.exe
- 'ci####.zapto.org':80
- ci####.zapto.org/result?21####
- ci####.zapto.org/result?22####
- ci####.zapto.org/result?23####
- ci####.zapto.org/result?18####
- ci####.zapto.org/result?19####
- ci####.zapto.org/result?20####
- DNS ASK ci####.zapto.org
- ClassName: 'Indicator' WindowName: '(null)'