Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'opensvchost' = '<Полный путь к вирусу>'
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://fc##ive.us/39968034
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://fc##ive.us/47305193
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://fc##ive.us/17697779
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://fc##ive.us/93477490
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://fc##ive.us/61838954
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\93477490[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\17697779[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\39968034[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\61838954[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\47305193[1]
- 'localhost':1039
- 'localhost':1040
- 'fc##ive.us':80
- 'localhost':1036
- 'localhost':1037
- 'localhost':1038
- fc##ive.us/93477490
- fc##ive.us/17697779
- fc##ive.us/39968034
- fc##ive.us/61838954
- fc##ive.us/47305193
- DNS ASK fc##ive.us
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'