Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'LockIE' = '<Полный путь к вирусу> /r'
- <SYSTEM32>\ipconfig.exe /flushdns
- <SYSTEM32>\cmd.exe /c ""%TEMP%\AutoDns.cmd" "
- <SYSTEM32>\ipconfig.exe /all
- %WINDIR%\NavCheck
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\tt[1].htm
- %TEMP%\AutoDns.cmd
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\aaaa[1].asp
- %TEMP%\UG1.tmp
- %TEMP%\AutoDns.cmd
- %TEMP%\UG1.tmp
- 'tt#.#gjbl.com':80
- '53#.#08888.org':80
- 'localhost':1035
- tt#.#gjbl.com/tt.htm
- 53#.#08888.org/aaaa.asp?id##################################
- DNS ASK tt#.#gjbl.com
- DNS ASK 53#.#08888.org
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''