Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'dxuoxjucvu' = '<SYSTEM32>\regsvr32.exe /s "<SYSTEM32>\acrqzinijbrnp.dll"'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'dxuoxjucvu' = '<SYSTEM32>\regsvr32.exe /s "%TEMP%\nsg3.tmp.dll"'
- <SYSTEM32>\regsvr32.exe /s "<SYSTEM32>\acrqzinijbrnp.dll"
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\37323c08-300e-4fe5-9b00-b5be8a165db6
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\gadgets-for-men[1].htm
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %TEMP%\nsg3.tmp.dll
- %TEMP%\nsr2.tmp\System.dll
- <SYSTEM32>\fpgvmwajtgnziia.exe
- %TEMP%\ap1CF70.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\notify[1].php
- %TEMP%\nsr2.tmp\System.dll
- %TEMP%\ap1CF70.tmp
- %TEMP%\nsg3.tmp.dll в <SYSTEM32>\acrqzinijbrnp.dll
- 'localhost':1039
- 'ub###licks.biz':80
- 'localhost':1036
- ub###licks.biz/mod/notify.php?re####################################################################
- DNS ASK ux.###rclicks.biz
- DNS ASK ub###licks.biz
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''