Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\Stuvwx Abcdefgh Jkl] 'Start' = '00000002'
- <SYSTEM32>\360DL222.exe
- <DRIVERS>\pipi_ins_268.exe
- <SYSTEM32>\360LX111.exe
- <DRIVERS>\pipi_ins_268.exe (загружен из сети Интернет)
- <SYSTEM32>\svchost.exe -k netsvcs
- <SYSTEM32>\svchost.exe -k imgsvc
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://pl##.tenoad.com/DirectLink.aspx?pl###########
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.ew##ai.com/iclk/?zo##############
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://ne#.#gooad.com/DirectLink.aspx?pl###########
- 360tray.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\3214[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\kguigushi[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\buhuiwg[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\lelev8[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\iclk[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\langman[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\langman[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\lelev8[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\buhuiwg[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\3214[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\langman[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\6625[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1118-DnYCM[2].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\iclk[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\5266[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\iclk[1]
- C:\Documents and Settings\temp.gif
- <SYSTEM32>\GHKGJH.dll
- <SYSTEM32>\Soug.ime
- C:\Documents and Settings\temp2.gif
- <DRIVERS>\pipi_ins_268.exe
- <DRIVERS>\pipi_ins_268.exe.tmp
- <SYSTEM32>\360DL222.exe
- <SYSTEM32>\360LX111.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\6625[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\DirectLink[1].aspx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1118-DnYCM[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\DirectLink[1].aspx
- %PROGRAM_FILES%\Xtuv\Dtuvwxyab.jpg
- C:\Documents and Settings\Temp.log
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\6625[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1118-DnYCM[1].htm
- <SYSTEM32>\GHKGJH.dll
- %PROGRAM_FILES%\Xtuv\Dtuvwxyab.jpg
- <SYSTEM32>\360LX111.exe
- <SYSTEM32>\360DL222.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\lelev8[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\langman[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\buhuiwg[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\3214[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\langman[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\iclk[1]
- C:\Documents and Settings\Temp.log
- <DRIVERS>\pipi_ins_268.exe.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\iclk[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\5266[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\6625[1]
- 'www.52###nhu.com':80
- 'www.le##v8.net':80
- 'www.le##v.com':80
- 'www.87##w.com':80
- 'www.32#4.cn':80
- 'www.bu##iwg.com':80
- 'www.kg###ushi.com':80
- 'la####n520.3322.org':70
- 'www.52#6.me':80
- 'pl##.tenoad.com':80
- 'dl.#ipi.cn':80
- 'localhost':1041
- 'localhost':1035
- 'www.66#5.me':80
- 'www.ew##ai.com':80
- 'localhost':1045
- 'ne#.#gooad.com':80
- 'localhost':1043
- 'localhost':1044
- www.52###nhu.com/langman
- www.le##v8.net/?la#####
- www.le##v.com/langman
- www.87##w.com/5266
- www.bu##iwg.com/
- www.kg###ushi.com/
- www.32#4.cn/?la#####
- www.52#6.me/?la#####
- dl.#ipi.cn/pipi_ins_268.exe
- www.ew##ai.com/iclk/?zo##############
- www.66#5.me/soft/Dn_YCM/1118-DnYCM.htm
- www.66#5.me/?39##
- www.66#5.me/
- www.le##v.com/5266
- ne#.#gooad.com/DirectLink.aspx?pl###########
- pl##.tenoad.com/DirectLink.aspx?pl###########
- DNS ASK www.32#4.cn
- DNS ASK www.le##v8.net
- DNS ASK www.52###nhu.com
- DNS ASK la####n520.3322.org
- DNS ASK www.kg###ushi.com
- DNS ASK www.bu##iwg.com
- DNS ASK www.52#6.me
- DNS ASK www.ew##ai.com
- DNS ASK dl.#ipi.cn
- DNS ASK www.66#5.me
- DNS ASK ne#.#gooad.com
- DNS ASK www.87##w.com
- DNS ASK www.le##v.com
- DNS ASK pl##.tenoad.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'CicLoaderWndClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: '360RPS.EXE'
- ClassName: '' WindowName: '360rp.exe'
- ClassName: '' WindowName: '360sd.exe'
- ClassName: '' WindowName: 'PIPIPLayer.EXE'
- ClassName: '' WindowName: '360Tray.exe'