Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = 'explorer.exe <SYSTEM32>\<Имя вируса>.exe'
- <Имя диска съемного носителя>:\autorun.inf
- <Имя диска съемного носителя>:\<Имя вируса>.exe
- <SYSTEM32>\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\whatismyip[1].4302127359
- %TEMP%\~ip.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\checkip.dyndns[1].1124919688
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\checkip.dyndns[1].3462789501
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\whatismyip[1].9928372139
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\checkip.dyndns[1].6828681827
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\whatismyip[1].7661030465
- <SYSTEM32>\processlist.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\sever[1].txtt
- <Текущая директория>\1.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\sever[1].txtt
- <SYSTEM32>\<Имя вируса>.exe
- <SYSTEM32>\autorun.ini
- <SYSTEM32>\1.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\sever[1].txtt
- %TEMP%\~ip.tmp
- <SYSTEM32>\processlist.txt
- <SYSTEM32>\1.txt
- <Текущая директория>\1.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\sever[1].txtt
- 'ch####p.dyndns.org':80
- 'www.wh###smyip.com':80
- 'ce######ne19.byethost2.com':80
- 'sa######2010.byethost5.com':80
- www.wh###smyip.com/?rn########################################
- www.wh###smyip.com/?rn#########################################
- ch####p.dyndns.org/?rn#########################################
- ce######ne19.byethost2.com/data/sever.txtt
- sa######2010.byethost5.com/data/sever.txtt
- DNS ASK ch####p.dyndns.org
- DNS ASK www.wh###smyip.com
- DNS ASK ce######ne19.byethost2.com
- DNS ASK sa######2010.byethost5.com