Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Network balancing' = '%WINDIR%\svchost.exe'
- %WINDIR%\svchost.exe
- <SYSTEM32>\cmd.exe /c "%TEMP%\req27.bat"
- %WINDIR%\svcph.dll
- %APPDATA%\appmcs\app0x00.dat
- %APPDATA%\appmcs\sdt\tmp\y29.tmp
- %APPDATA%\appmcs\sdt\tmp\z2A.tmp
- %APPDATA%\appmcs\sdt\d192.168.190.132_20110704_150344.dat
- %APPDATA%\appmcs\sdt\tmp\2D.tmp
- %APPDATA%\appmcs\sdt\tmp\2B.tmp
- %APPDATA%\appmcs\sdt\tmp\2C.tmp
- %APPDATA%\appmcs\sdt\tmp\x28.tmp
- %APPDATA%\appmcs\sdt\tmp\z3.tmp
- <DRIVERS>\sysaiudor.sys
- %APPDATA%\appmcs\sdt\tmp\x1.tmp
- %APPDATA%\appmcs\sdt\tmp\y2.tmp
- %WINDIR%\RCX26.tmp
- %TEMP%\req27.bat
- %WINDIR%\svchost.exe
- %WINDIR%\RCX25.tmp
- %WINDIR%\svcph.dll
- %WINDIR%\svchost.exe
- %APPDATA%\appmcs\sdt\tmp\2B.tmp
- %APPDATA%\appmcs\sdt\tmp\z2A.tmp
- %APPDATA%\appmcs\sdt\tmp\2C.tmp
- %APPDATA%\appmcs\sdt\tmp\2D.tmp
- %APPDATA%\appmcs\sdt\tmp\txt.txt
- %APPDATA%\appmcs\sdt\tmp\y29.tmp
- %APPDATA%\appmcs\sdt\tmp\y2.tmp
- %APPDATA%\appmcs\sdt\tmp\x1.tmp
- %APPDATA%\appmcs\sdt\tmp\z3.tmp
- %APPDATA%\appmcs\sdt\tmp\x28.tmp
- %WINDIR%\svchost.exe
- из <Полный путь к вирусу> в <Текущая директория>\7527.tmp
- 'www.wh###smyip.com':80
- www.wh###smyip.com/automation/n09230945.asp
- DNS ASK www.wh###smyip.com
- ClassName: 'Indicator' WindowName: ''