Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'rundl32' = '<Полный путь к вирусу>'
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%TEMP%\CSC1.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\ttyf_y66.cmdline"
- %TEMP%\CSC1.tmp
- %TEMP%\RES2.tmp
- %TEMP%\ttyf_y66.dll
- %TEMP%\ttyf_y66.0.cs
- %TEMP%\ttyf_y66.cmdline
- %TEMP%\ttyf_y66.out
- %TEMP%\ttyf_y66.cmdline
- %TEMP%\ttyf_y66.out
- %TEMP%\ttyf_y66.0.cs
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %TEMP%\ttyf_y66.dll
- '17#.#3.71.117':80
- 'wp#d':80
- 17#.#3.71.117/mm9isvec1mm/g.php?d=#
- wp#d/wpad.dat
- DNS ASK me#####er.hotmail.com
- DNS ASK wp#d
- '<IP-адрес в локальной сети>':1036
- ClassName: 'Shell_TrayWnd' WindowName: ''