Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'ajyWlxBiFK.exe' = '%TEMP%\ajyWlxBiFK.exe'
- '%TEMP%\ajyWlxBiFK.exe'
- %WINDIR%\Explorer.EXE
- %TEMP%\tmpFEC8.tmp.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\433-direct[1].exe
- %TEMP%\200750.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\433-direct[1].exe
- %TEMP%\ajyWlxBiFK.exe
- %TEMP%\XPUAbBynvb.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\readdatagateway[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\433-direct[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\readdatagateway[1].php
- из <Полный путь к вирусу> в %TEMP%\tmp1.tmp
- 'aw###ice.com':80
- 'se#####indestimate.org':80
- 'se###hafter.org':80
- se#####indestimate.org/readdatagateway.php?ty#######################################
- aw###ice.com/any5/433-direct.exe
- se###hafter.org/readdatagateway.php?ty####################################
- se###hafter.org/any5/433-direct.exe
- DNS ASK aw###ice.com
- DNS ASK se#####indestimate.org
- DNS ASK se###hafter.org
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'