Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\wainarr] 'Start' = '00000002'
- %PROGRAM_FILES%\Windows Work\wainarr.exe 1
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\50888771[1].html
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Test[1].html
- %PROGRAM_FILES%\Windows Work\Tmpwainarr.exe.dat
- %WINDIR%\Temp\TMP1.tmp
- %PROGRAM_FILES%\Windows Work\wainarr.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Test[1].html
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\50888771[1].html
- %PROGRAM_FILES%\Windows Work\wainarr.exe
- из <Полный путь к вирусу> в %TEMP%\119859.dat
- 'www.my##hn.com':80
- 'www.ne##ing.com':80
- '20#.#6.232.182':80
- www.my##hn.com/root/RedGirl/IP/50888771.html
- www.my##hn.com/root/RedGirl/IP/Test.html
- www.ne##ing.com/root/RedGirl/IP/50888771.html
- www.ne##ing.com/root/RedGirl/IP/Test.html
- DNS ASK www.my##hn.com
- DNS ASK www.ne##ing.com
- DNS ASK www.microsoft.com
- ClassName: 'Shell_TrayWnd' WindowName: ''