Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = '<Полный путь к вирусу>'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\i[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\ib2[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\i[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\i[1].php
- 'localhost':1039
- 'to###.#p2location.com':80
- '95.##3.198.56':80
- '95.##5.63.95':80
- '94.##.183.140':80
- 95.##3.198.56/i.php?a=#
- to###.#p2location.com/ib2/
- 95.##5.63.95/i.php?a=#
- 94.##.183.140/i.php?a=#
- DNS ASK to###.#p2location.com
- '<IP-адрес в локальной сети>':1040
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''