Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%TEMP%\CT.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'svchost' = '%TEMP%\CT.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%TEMP%\CT.exe'
- <SYSTEM32>\0912.exe
- %PROGRAM_FILES%\Windows NT\svchost.exe
- %TEMP%\CT.exe
- %TEMP%\Apple Engine.exe
- <SYSTEM32>\0912.exe (загружен из сети Интернет)
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\Simple[1].exe
- <SYSTEM32>\MSWINSCK.ocx
- %PROGRAM_FILES%\Windows NT\svchost.exe
- <SYSTEM32>\0912.exe
- %TEMP%\Apple Engine.exe
- %TEMP%\CT.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\mswinsck[1].ocx
- %TEMP%\~DF49AE.tmp
- 'si####ddos.oa.to':9000
- 'pd###.egloos.com':80
- 'localhost':1035
- pd###.egloos.com/pds/201209/12/40/Simple.exe
- pd###.egloos.com/pds/201206/21/40/mswinsck.ocx
- DNS ASK si####ddos.oa.to
- DNS ASK pd###.egloos.com
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''