Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'mstray' = '<LS_APPDATA>\conhost.exe'
- '<SYSTEM32>\ipconfig.exe'
- <LS_APPDATA>\414453.txt
- <LS_APPDATA>\413140.txt
- <LS_APPDATA>\457546.txt
- <LS_APPDATA>\496218.txt
- <LS_APPDATA>\467046.txt
- <LS_APPDATA>\info.txt
- <LS_APPDATA>\~temp.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\crnjeufu[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\crnjeufu[1].txt
- <LS_APPDATA>\365359.txt
- <LS_APPDATA>\457546.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\crnjeufu[1].txt
- <LS_APPDATA>\496218.txt
- <LS_APPDATA>\467046.txt
- <LS_APPDATA>\414453.txt
- <LS_APPDATA>\info.txt
- <LS_APPDATA>\365359.txt
- <LS_APPDATA>\413140.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\crnjeufu[1].txt
- из <Полный путь к вирусу> в <LS_APPDATA>\conhost.exe
- 'ho##.yimg.ca':80
- ho##.yimg.ca/cgi/command.asp?ho########################################
- ho##.yimg.ca/cgi/crnjeufu.txt
- ho##.yimg.ca/cgi/online.asp?ho##############################################
- ho##.yimg.ca/cgi/textup.asp
- DNS ASK ho##.yimg.ca
- ClassName: 'Indicator' WindowName: '(null)'