Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'userinit' = '<SYSTEM32>\userinit.exe,%WINDIR%\apppatch\xumghi.dat,'
- <SYSTEM32>\svchost.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\winlogon.exe
- firefox.exe
- chrome.exe
- opera.exe
- iexplore.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\home[1].htm
- %WINDIR%\Temp\C9B3.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\wpad[1].dat
- %WINDIR%\AppPatch\xumghi.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\news[1].htm
- %WINDIR%\Temp\BBE.tmp
- %WINDIR%\Temp\C9B3.tmp
- %WINDIR%\Temp\BBE.tmp
- из <Полный путь к вирусу> в %TEMP%\898.tmp
- 'wpad.localdomain':80
- 'di####talize.com':80
- 'www.bing.com':80
- wpad.localdomain/wpad.dat
- di####talize.com/home.php
- di####talize.com/news.php
- DNS ASK wpad.localdomain
- DNS ASK di####talize.com
- DNS ASK www.bing.com