Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{83BA45AF-FAAA-CDDD-BEEE-BCDE1234AB38}' = 'yxfhcjpg.dll'
- '<SYSTEM32>\zxfhajpg.exe'
- '%TEMP%\RarSFX0\fhzlwg.exe'
- '%TEMP%\RarSFX0\loadwg.exe'
- '<SYSTEM32>\cmd.exe' /c %TEMP%\~DFD391703.bat
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\yxfhcjpg.dll
- <SYSTEM32>\xzfhbjpg.sys
- %TEMP%\~DFD391703.bat
- <SYSTEM32>\zxfhajpg.exe
- %TEMP%\RarSFX0\intels.cax
- %TEMP%\RarSFX0\fhzlwg.exe
- %TEMP%\RarSFX0\loadwg.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pbwz[1].html
- %TEMP%\RarSFX0\fhzlwg.txt
- <SYSTEM32>\xzfhbjpg.sys
- <SYSTEM32>\yxfhcjpg.dll
- <SYSTEM32>\zxfhajpg.exe
- %TEMP%\RarSFX0\fhzlwg.exe
- %TEMP%\RarSFX0\intels.cax
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pbwz[1].html
- 'po###ng21.cn':80
- po###ng21.cn/pbwz.html
- DNS ASK po###ng21.cn
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'EDIT' WindowName: ''