Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Updata' = '%PROGRAM_FILES%\Microsoft ActiveSyncs\Updata.exe'
- %PROGRAM_FILES%\Microsoft ActiveSyncs\Updata.exe
- C:\update.exe
- C:\update.exe (загружен из сети Интернет)
- <Полный путь к вирусу>
- %PROGRAM_FILES%\Microsoft ActiveSyncs\Updata.exe
- %PROGRAM_FILES%\Microsoft ActiveSyncs\Updata.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\update[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\update[1].exe
- C:\update.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\update[1].exe
- %TEMP%\~DF4F60.tmp
- 'pd###.egloos.com':80
- 'localhost':1043
- '10.##.30.112':52
- 'bl##.naver.com':80
- 'hi###g.co.kr':80
- 'localhost':1039
- pd###.egloos.com/pds/201211/25/92/update.exe
- hi###g.co.kr/link.txt
- bl##.naver.com/PostView.nhn?bl############################################################################################################################################################################################
- DNS ASK pd###.egloos.com
- DNS ASK hi###g.co.kr
- DNS ASK bl##.naver.com
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''