Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Имя вируса>.exe' = '<Полный путь к вирусу>'
- [<HKLM>\SYSTEM\ControlSet001\Services\Gfiyto Raguyusb Nky] 'Start' = '00000002'
- 'C:\shurufa.ime'
- '<SYSTEM32>\svchost.exe' -k imgsvc
- '<SYSTEM32>\svchost.exe' -k netsvcs
- C:\Net-Temp.ini
- %PROGRAM_FILES%\Smhk\Fmanekhgi.pic
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\941pojie[1]
- C:\shurufa.ime
- C:\2124400.dll
- C:\NT_Path.jpg
- %PROGRAM_FILES%\Smhk\Fmanekhgi.pic
- C:\shurufa.ime
- C:\2124400.dll
- C:\Net-Temp.ini
- C:\NT_Path.jpg
- 'www.94###jie.com':80
- '17###6.8800.org':81
- 'localhost':1035
- 'www.iw##eng.com':80
- www.iw##eng.com/tc.txt
- www.94###jie.com/
- www.iw##eng.com/ok.txt
- DNS ASK 17###6.8800.org
- DNS ASK www.94###jie.com
- DNS ASK www.iw##eng.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'ENewFrame' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''