Техническая информация
- [<HKLM>\SOFTWARE\Classes\cnty File\shell\open\command] '' = '%PROGRAM_FILES%\comsoft\dialers\hotaction_ch\hotaction_ch.exe %1'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HotAction_ch' = '%PROGRAM_FILES%\comsoft\dialers\hotaction_ch\hotaction_ch.exe /noconnect'
- %PROGRAM_FILES%\comsoft\dialers\hotaction_ch\hotaction_ch.exe -kill <Полный путь к вирусу> /install
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\getclientid[1].2600_Service_Pack_2_PlatformID_2&GMC=1307111297
- %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\MachineKeys\8d65b1f830a114ab330887cff9f40022_ffcb838e-6d3b-4e44-a259-8ac8f5c94c4f
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\bb[1].jhtml
- %TEMP%\WK_1.tmp
- %HOMEPATH%\Desktop\HotAction_ch.lnk
- <SYSTEM32>\HotAction_ch-uninstall.exe
- %PROGRAM_FILES%\comsoft\dialers\hotaction_ch\hotaction_ch.exe
- %HOMEPATH%\Start Menu\HotAction_ch.lnk
- %HOMEPATH%\Start Menu\Programs\HotAction_ch.lnk
- 'localhost':1040
- '20#.#77.92.193':80
- 'localhost':1038
- '20#.#77.92.204':80
- 20#.#77.92.193/party/bb.jhtml?pi#################################
- 20#.#77.92.204/w/getclientid?sr#########################################################################################################
- ClassName: '' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'HOTACTION_CH' WindowName: ''
- ClassName: '' WindowName: 'HotAction_ch'
- ClassName: 'Shell_TrayWnd' WindowName: ''