Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Service' = '"%HOMEPATH%\System\Service.exe"'
- '%HOMEPATH%\System\Service.exe'
- '%TEMP%\dc006.exe'
- '<SYSTEM32>\ping.exe' localhost -n 1
- %HOMEPATH%\System\CommFunc.dll
- %HOMEPATH%\System\CommFunc.dat
- %TEMP%\ms5723.tmp
- <Текущая директория>\<Имя вируса>.doc
- %TEMP%\dc006.exe
- %HOMEPATH%\System\Service.exe
- 'us###pstore.net':443
- 'sg###pstore.net':5050
- '20#.#6.232.182':80
- 'sg###pstore.net':443
- DNS ASK us###pstore.net
- DNS ASK sg###pstore.net
- DNS ASK www.microsoft.com
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'WordPadClass' WindowName: '(null)'