Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XiOSS' = '<Полный путь к вирусу>'
- '<SYSTEM32>\spoolsx.exe'
- '<SYSTEM32>\spoolsx.exe' (загружен из сети Интернет)
- '<SYSTEM32>\ping.exe' 127.1 -n 3
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\spoolsx[1].jpg
- %WINDIR%\Temp\scs2.tmp
- C:\cd.bat
- <SYSTEM32>\spoolsx.exe
- <SYSTEM32>\xmyy36\haoapi.dll
- <SYSTEM32>\xmyy36\gzip.dll
- %WINDIR%\Temp\scs1.tmp
- <SYSTEM32>\xmyy36\xmyy.exe
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- '19#.#88.104.85':80
- 'localhost':1037
- '12#.#48.245.10':88
- 19#.#88.104.85/soft/spoolsx.jpg
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b14.b18.380001'