Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XiOSS' = '<Полный путь к вирусу>'
- '<SYSTEM32>\spoolsf.exe'
- '<SYSTEM32>\spoolsf.exe' (загружен из сети Интернет)
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\ping.exe' 127.1 -n 3
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %WINDIR%\Temp\scs2.tmp
- <SYSTEM32>\spoolsf.exe
- C:\cd.bat
- %WINDIR%\Temp\scs1.tmp
- <SYSTEM32>\xmyy154\gzip.dll
- <SYSTEM32>\xmyy154\haoi.dll
- <SYSTEM32>\xmyy154\xmyyz.exe
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- 'localhost':1041
- '19#.#88.104.85':80
- '12#.#48.245.10':88
- '22#.#3.45.106':808
- 19#.#88.104.85/soft/spoolsf.jpg
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b64.b68.380001'