Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Имя вируса>' = '<Полный путь к вирусу> run'
- '<SYSTEM32>\rename2.exe'
- '<SYSTEM32>\rename2.exe' (загружен из сети Интернет)
- <SYSTEM32>\rename2.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\rename2[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\hide_bundle[1].ini
- %PROGRAM_FILES%\Searchhost\uver.ini
- <Текущая директория>\hide_bundle.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\uver[1].ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\hidden_boot[1].php
- %PROGRAM_FILES%\Searchhost\_uver.ini
- %PROGRAM_FILES%\Searchhost\SearchhostUpdate.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\SearchhostUpdate[1].exe
- %PROGRAM_FILES%\Searchhost\_uver.ini
- <Текущая директория>\hide_bundle.ini
- 'jo###ance.kr':80
- 'localhost':1036
- jo###ance.kr/app/UrlManager/rename2.exe
- jo###ance.kr/app/UrlManager/bundle/hide_bundle.ini
- jo###ance.kr/app/UrlManager/SearchhostUpdate.exe
- jo###ance.kr/log/hidden_boot.php
- jo###ance.kr/app/UrlManager/bundle/uver.ini
- DNS ASK jo###ance.kr
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'