Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'system32' = '<Полный путь к вирусу>'
- %HOMEPATH%\Start Menu\Programs\Startup\aa.lnk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\r15029034800.yun89[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\response[1].asp
- <Текущая директория>\SuperDeletor.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\response[1].asp
- <Текущая директория>\SuperDeletor.txt
- 'au##.#earch.msn.com':80
- 'localhost':1038
- 'r1#####34800.yun89.com':80
- r1#####34800.yun89.com/
- au##.#earch.msn.com/response.asp?MT###########################
- r1#####34800.yun89.com/5636.txt
- DNS ASK au##.#earch.msn.com
- DNS ASK r1#####34800.yun89.com
- ClassName: '(null)' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'