Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Explorateur Windows' = '<Полный путь к вирусу>'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES3.tmp" "%TEMP%\CSC2.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\nk0mt6zj.cmdline"
- %TEMP%\nk0mt6zj.dll
- %TEMP%\RES3.tmp
- <Текущая директория>\data.cry
- %TEMP%\tmp1.tmp
- %TEMP%\nk0mt6zj.cmdline
- %TEMP%\nk0mt6zj.0.cs
- %TEMP%\CSC2.tmp
- %TEMP%\nk0mt6zj.out
- %TEMP%\nk0mt6zj.out
- %TEMP%\nk0mt6zj.cmdline
- %TEMP%\tmp1.tmp
- %TEMP%\nk0mt6zj.dll
- %TEMP%\RES3.tmp
- %TEMP%\CSC2.tmp
- %TEMP%\nk0mt6zj.0.cs
- 'so#.#tspace.eu':21
- '09.##te90.net':21
- 'wp#d':80
- wp#d/wpad.dat
- DNS ASK so#.#tspace.eu
- DNS ASK 09.##te90.net
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''