Техническая информация
- '<Полный путь к вирусу>:del'
- '<SYSTEM32>\rundll32.exe' %TEMP%\sbcrnsv\sxnqvge\wow.dll,0
- %WINDIR%\Explorer.EXE
- %TEMP%\sbcrnsv\sxnqvge\wow.dll
- %APPDATA%\Microsoft\SystemCertificates\My\Certificates\A2EB615926EEAE3007EE1F7DF0632B70F2A9F2D0
- %TEMP%\sbcrnsv\sxnqvge\wow.ini
- <Полный путь к вирусу>:del
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5.1.2600_2[1].0_32
- C:\System Volume Information\EFS0.LOG
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\b0679867-c71d-4f82-9a3a-c54c42fe29e3
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\7819185f6b567c7d60f94c155a878bd8_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\sbcrnsv\sxnqvge\wow.dll
- C:\System Volume Information\EFS0.LOG
- '74.##5.232.51':80
- 'kr##eon.com':80
- 'localhost':1038
- '18#.#65.232.20':80
- 18#.#65.232.20/19ad89bc3e3c9d7ef68b89523eff1987/3.0/050/23ef5514-3059-436f-a4a7-4cefaab20eb1/5.1.2600_2.0_32
- DNS ASK so##gen.com
- DNS ASK kr##eon.com
- DNS ASK google.com
- ClassName: 'rfetorewutireu' WindowName: 'dfreitfpojglfd'