Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XiOSS' = '<Полный путь к вирусу>'
- '<SYSTEM32>\xmyy46\svchost.exe'
- '<SYSTEM32>\spoolsx.exe'
- '<SYSTEM32>\xmyy46\xmyyz.exe'
- '<SYSTEM32>\xmyy45\xmyy.exe' 1+5+10
- '<SYSTEM32>\spoolsx.exe' (загружен из сети Интернет)
- '<SYSTEM32>\ping.exe' 127.1 -n 3
- '<SYSTEM32>\ping.exe' 127.1 -n 10
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings] 'WarnonZoneCrossing' = '00000000'
- C:\tsin.bat
- <SYSTEM32>\xmyy46\svchost.exe
- C:\cd.bat
- <SYSTEM32>\spoolsx.exe
- <SYSTEM32>\xmyy45\gzip.dll
- <SYSTEM32>\xmyy46\xmyyz.exe
- <SYSTEM32>\xmyy45\xmyy.exe
- <SYSTEM32>\xmyy45\haoapi.dll
- <SYSTEM32>\xmyy45\xmyy.exe
- %TEMP%\~DF8C79.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\ic[1].asp
- '22#.#3.45.106':808
- 'localhost':1043
- '19#.#88.104.85':80
- '12#.#48.245.10':88
- '20####07.ip138.com':80
- '20#.#46.219.44':88
- 19#.#88.104.85/soft/spoolsx.jpg
- 20####07.ip138.com/ic.asp
- DNS ASK 20####07.ip138.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''