Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\drk] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%WINDIR%\Debug\dtmon.exe' = '%WINDIR%\Debug\dtmon.exe:*:Enabled:KL'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Полный путь к вирусу>' = '<Полный путь к вирусу>:*:Enabled:KL'
- %WINDIR%\Debug\dtmon.exe /start
- [<HKCU>\SOFTWARE\FlashFXP\3]
- [<HKLM>\SOFTWARE\FlashFXP\3]
- %WINDIR%\Debug\ddid
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\_uid=464659&ver=9dxpa[1]
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\wpad[1].dat
- %WINDIR%\Debug\bc
- %WINDIR%\Debug\dtmon.exe
- %WINDIR%\Debug\result.dark
- %WINDIR%\Debug\ddid
- %WINDIR%\Debug\dtmon.exe
- %WINDIR%\Debug\result.dark
- %WINDIR%\Debug\bc
- 'wpad.localdomain':80
- '?u########9&ver=9dxpa.localdomain':80
- wpad.localdomain/wpad.dat
- ?u########9&ver=9dxpa.localdomain/
- DNS ASK wpad.localdomain
- DNS ASK ?u########9&ver=9dxpa.localdomain