Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'wuaudtu' = '%APPDATA%\system\wuaudtu.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'wuaudtu' = '%APPDATA%\system\wuaudtu.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%APPDATA%\system\scvhost.exe,%APPDATA%\system\wuaudtu.exe,'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'scvhost' = '%APPDATA%\system\scvhost.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'scvhost' = '%APPDATA%\system\scvhost.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%APPDATA%\system\scvhost.exe,'
- %APPDATA%\system\wuaudtu.exe
- %APPDATA%\system\scvhost.exe
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\log[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\log[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\log[1].php
- 'pa###bin.com':80
- 'localhost':1043
- 'wp#d':80
- 'na##ve.ml':80
- pa###bin.com/raw.php?i=########
- na##ve.ml/files/others/command.txt
- wp#d/wpad.dat
- na##ve.ml/files/others/log.php?w=#####################
- DNS ASK pa###bin.com
- DNS ASK na##ve.ml
- DNS ASK wp#d
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''