Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Internet Explorer\Extensions\{F2648D0C-0033-4E34-A0DA-473C42B0A99A}] 'Exec' = 'http://www.vogoo.net/?user='
- <SYSTEM32>\Browser.exe %CommonProgramFiles%\Drivers\Bin\fthua.dll
- <SYSTEM32>\Stat.exe iemonhits
- <SYSTEM32>\ekljbtp.exe
- %TEMP%\nsf2.tmp\nsRandom.dll
- <SYSTEM32>\tslable.ini
- <SYSTEM32>\data.dsz
- <SYSTEM32>\AutoAD.exe
- <SYSTEM32>\data.ini
- <SYSTEM32>\tslablec.ini
- <SYSTEM32>\z.ico
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\homepagepic[1].aspx
- %CommonProgramFiles%\Drivers\Bin\tsmfl.dll
- <SYSTEM32>\data.ldb
- <SYSTEM32>\Client_TB.exe
- %TEMP%\nsf2.tmp\System.dll
- %TEMP%\nsf2.tmp\AccessControl.dll
- <Текущая директория>\config.ini
- %TEMP%\nsf2.tmp\blowfish.dll
- %TEMP%\nsf2.tmp\nsProcess.dll
- <SYSTEM32>\tbword.szd
- <SYSTEM32>\Browser.exe
- <SYSTEM32>\IEMon.exe
- <SYSTEM32>\config.ini
- <SYSTEM32>\Stat.exe
- <SYSTEM32>\AutoAD.exe
- %TEMP%\nsf2.tmp\nsRandom.dll
- %TEMP%\nsf2.tmp\System.dll
- <SYSTEM32>\data.ldb
- %TEMP%\nsf2.tmp\AccessControl.dll
- %TEMP%\nsf2.tmp\blowfish.dll
- %TEMP%\nsf2.tmp\nsProcess.dll
- 'co####.netbarad.net':80
- co####.netbarad.net/homepagepic.aspx?us###############################
- DNS ASK co####.netbarad.net