Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'iplph' = 'rundll32.exe "%APPDATA%\iplph.dll",GetIndexInfo'
- '<SYSTEM32>\rundll32.exe' "%APPDATA%\iplph.dll",GetIndexInfo
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\fid=BwCeAAEATXkCAAEFCBcAAAAAAAAAAAAAAAAAAABjDQQbCwAAAL2rb5jiEXWvrLh0giZvmW8tL3xRAABVVVVVVVVVVVVVVVVVVVVVLTvOARpSdZ9NeQIAVlRRXF5TQlh_Z3d0a2d4anoGAQKrkSInYZ[1]
- %APPDATA%\rdscf.dll
- %APPDATA%\iplph.dll
- '11#####.##n99.filesuploadonline.com':80
- 11#####.##n99.filesuploadonline.com/upload/fid=BwCeAAEATXkCAAEFCBcAAAAAAAAAAAAAAAAAAABjDQQbCwAAAL2rb5jiEXWvrLh0giZvmW8tL3xRAABVVVVVVVVVVVVVVVVVVVVVLTvOARpSdZ9NeQIAVlRRXF5TQlh_Z3d0a2d4anoGAQKrkSInYZO9YAAAAAAAAQcAAAAHAAAANFYA
- DNS ASK 11#####.##n99.filesuploadonline.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''