Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{729B6C61-BDC5-4C09-A1DE-A296BA0B89EC}' = ''
- '%HOMEPATH%\Favorites\scvhosr.exe'
- '%TEMP%\96584633.exe'
- '%TEMP%\360kpg.exe'
- '%HOMEPATH%\Favorites\scvhosr.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\_xr.bat" "
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\a[1].html
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\lockieinfo[1].txt
- %WINDIR%\msprintmsgger.txt
- %HOMEPATH%\Favorites\My_DDL_index.html
- %TEMP%\_xr.bat
- %TEMP%\96584633.exe
- %TEMP%\360kpg.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\SysInfo.wmp
- %HOMEPATH%\Favorites\scvhosr.exe
- %TEMP%\360kpg.exe
- %HOMEPATH%\Favorites\My_DDL_index.html в %HOMEPATH%\Favorites\scvhosr.exe
- 'h9##.info':80
- 'www.ad##20.com':80
- 'localhost':1036
- h9##.info/a.html
- www.ad##20.com/lockieinfo.txt
- DNS ASK h9##.info
- DNS ASK www.ad##20.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'ListBox' WindowName: 'ZXY_Exe'
- ClassName: 'ListBox' WindowName: 'ZXY_Dll'