Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XiOSS' = '<Полный путь к вирусу>'
- '<SYSTEM32>\spoolsfa.exe'
- '<SYSTEM32>\spoolsfa.exe' (загружен из сети Интернет)
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\ping.exe' 127.1 -n 3
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %WINDIR%\Temp\scs2.tmp
- <SYSTEM32>\spoolsfa.exe
- C:\cd.bat
- %WINDIR%\Temp\scs1.tmp
- <SYSTEM32>\xmyy155\gzip.dll
- <SYSTEM32>\xmyy155\haoi.dll
- <SYSTEM32>\xmyy155\xmyyz.exe
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- <SYSTEM32>\PerfStringBackup.TMP
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- 'localhost':1040
- '19#.#88.104.85':80
- '12#.#48.245.10':88
- '22#.#3.45.106':808
- 19#.#88.104.85/soft/spoolsfa.jpg
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b5c.b60.380001'