Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'A15.exe' = '%PROGRAM_FILES%\LP\4E28\A15.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'eOBtxP0uc3n4Q6W' = '%APPDATA%\dwme.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'bF3pmG5JdKgZhXU8234A' = '<SYSTEM32>\AV Security 2012v121.exe'
- <SYSTEM32>\AV Security 2012v121.exe Security 2012v121.exe 5985<Полный путь к вирусу>
- %PROGRAM_FILES%\LP\4E28\1.tmp
- %TEMP%\dwme.exe start%APPDATA%\88E66\C344E.exe%%APPDATA%\88E66
- %APPDATA%\dwme.exe auto
- <SYSTEM32>\msiexec.exe /V
- %HOMEPATH%\Start Menu\Programs\AV Security 2012\AV Security 2012.lnk
- %PROGRAM_FILES%\LP\4E28\A15.exe
- %HOMEPATH%\Desktop\AV Security 2012.lnk
- %APPDATA%\88E66\680F.8E6
- %PROGRAM_FILES%\LP\4E28\1.tmp
- %APPDATA%\Ltx0ycS1iDoGQ6W\AV Security 2012.ico
- %TEMP%\dwme.exe
- <SYSTEM32>\AV Security 2012v121.exe
- %APPDATA%\dwme.exe
- %APPDATA%\ldr.ini
- 'pi####ewonline.com':80
- '74.##5.232.51':80
- pi####ewonline.com/sp.php?ad############
- 74.##5.232.51/
- DNS ASK ru####stumprs.com
- DNS ASK en#####ringcrossing.com
- DNS ASK pi####ewonline.com
- DNS ASK google.com
- '<IP-адрес в локальной сети>':1038
- '<IP-адрес в локальной сети>':1036
- '<IP-адрес в локальной сети>':1037
- ClassName: 'Shell_TrayWnd' WindowName: ''