Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'pHkjgosOXw.exe' = '%TEMP%\pHkjgosOXw.exe'
- %TEMP%\pHkjgosOXw.exe
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- %TEMP%\yYEWKCMHlE.dll
- %TEMP%\pHkjgosOXw.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\404[1].php
- из <Полный путь к вирусу> в %TEMP%\tmp1.tmp
- 'cl####iolent.org':80
- cl####iolent.org/404.php?ty################################
- DNS ASK cl####iolent.org
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''