Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'winregistery' = '<Полный путь к вирусу>'
- '%APPDATA%\winconf.exe'
- '%APPDATA%\winconf.exe' (загружен из сети Интернет)
- '<SYSTEM32>\reg.exe' ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v winregistery /t REG_SZ /d "<Полный путь к вирусу>"
- '<SYSTEM32>\cmd.exe' /c ""%APPDATA%\registerymane.cmd" "
- opera.exe
- chrome.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\update[1].exe
- %APPDATA%\extension.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\pingjs[1]
- %APPDATA%\winconf.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\key[1].php
- %APPDATA%\registerymane.cmd
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\ext[1].dll
- %APPDATA%\winregist.er
- %APPDATA%\registerymane.cmd
- %APPDATA%\extension.dll
- %APPDATA%\winregist.er
- 'fe##ps.com':80
- 'wh##.amung.us':80
- 'fe##rx.com':80
- 'localhost':1036
- 'fe##xt1.com':80
- fe##ps.com/update.exe
- wh##.amung.us/pingjs/?k=#########
- fe##xt1.com/key.php
- fe##rx.com/php4/ext.dll
- DNS ASK fe##ps.com
- DNS ASK wh##.amung.us
- DNS ASK fe##xt1.com
- DNS ASK fe##rx.com
- ClassName: 'Indicator' WindowName: '(null)'