Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'exe.exe' = '%TEMP%\exe.exe'
- '%TEMP%\exe.exe'
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\readdatagateway[1].php
- %TEMP%\188906.exe
- %TEMP%\exe.exe
- %TEMP%\maindll.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\readdatagateway[1].php
- из <Полный путь к вирусу> в %TEMP%\tmp1.tmp
- 'me####ullwai.com':80
- me####ullwai.com/readdatagateway.php?ty################################################
- DNS ASK me####ullwai.com
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'