Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe,%APPDATA%\<Имя вируса>.exe,'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\dr[1].htm
- %APPDATA%\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dr[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\dr[1].htm
- 'ma#.##store.com.tw':80
- ma#.##store.com.tw/dr.asp
- DNS ASK ma#.##store.com.tw