Техническая информация
- %HOMEPATH%\Start Menu\Programs\Startup\netbhl32.exe
- %WINDIR%\Explorer.EXE
- %TEMP%\~TM9.tmp
- %TEMP%\~TM8.tmp
- %TEMP%\~TM7.tmp
- %WINDIR%\Temp\~TMC.tmp
- %WINDIR%\Temp\~TMB.tmp
- %WINDIR%\Temp\~TMA.tmp
- %TEMP%\~TM5.tmp
- %TEMP%\~TM3.tmp
- %TEMP%\~TM2.tmp
- %TEMP%\~TM1.tmp
- %TEMP%\~TM4.tmp
- %TEMP%\~TM15258.TMP
- %APPDATA%\avdrn.dat
- %HOMEPATH%\Start Menu\Programs\Startup\netbhl32.exe
- %TEMP%\~TM15258.TMP
- %TEMP%\~TM9.tmp
- %TEMP%\~TM8.tmp
- %WINDIR%\Temp\~TMC.tmp
- %WINDIR%\Temp\~TMB.tmp
- %WINDIR%\Temp\~TMA.tmp
- %TEMP%\~TM3.tmp
- %TEMP%\~TM2.tmp
- %TEMP%\~TM1.tmp
- %TEMP%\~TM7.tmp
- %TEMP%\~TM5.tmp
- %TEMP%\~TM4.tmp
- из <Полный путь к вирусу> в %TEMP%\~TM6.tmp
- 'fa##ips.ru':80
- fa##ips.ru/AFRICA/controller.php?ac##############################################################
- DNS ASK fa##ips.ru
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'