Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'tHGacADarglpjlx.exe' = '%TEMP%\tHGacADarglpjlx.exe'
- %TEMP%\tHGacADarglpjlx.exe
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- %TEMP%\137062.exe
- %TEMP%\tHGacADarglpjlx.exe
- %TEMP%\lxifnsgRtfXauyC.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- из <Полный путь к вирусу> в %TEMP%\tmp1.tmp
- 'se####findfund.org':80
- se####findfund.org/404.php?ty################################
- DNS ASK se####findfund.org
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''