Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\pmnmjgd] 'Logon' = 'Logon'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\pmnmjgd] 'DllName' = 'pmnmjgd.dll'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{941508F8-CCD9-44E0-AC29-4F1E141373F7}' = ''
- '%WINDIR%\sdrive\trv.exe'
- '%WINDIR%\sdrive\urlx.exe'
- '%WINDIR%\sdrive\zm.exe'
- '<SYSTEM32>\cmd.exe' /c %TEMP%\removalfile.bat "%WINDIR%\sdrive\zm.exe"
- '<SYSTEM32>\cmd.exe' /c ""%WINDIR%\sdrive\service.bat" "
- <SYSTEM32>\winlogon.exe
- mpftray.exe
- NAVAPW32.EXE
- GUARD.EXE
- fsavaui.exe
- fsavgui.exe
- nod32.exe
- ZONEALARM.EXE
- ntvdm.exe
- zapro.exe
- outpost.exe
- spidernt.exe
- AVP.EXE
- AVP32.EXE
- AVP.COM
- AVGCC32.EXE
- AVGCTRL.EXE
- AVPCC.EXE
- fsav.exe
- fsav32.exe
- Drweb32w.exe
- AVPM.EXE
- AVSYNMGR.EXE
- <SYSTEM32>\pmnmjgd.dll
- %TEMP%\removalfile.bat
- %WINDIR%\sdrive\urlx.exe
- %WINDIR%\sdrive\service.bat
- %WINDIR%\sdrive\zm.exe
- %WINDIR%\sdrive\trv.exe
- %WINDIR%\sdrive\service.bat
- %WINDIR%\sdrive\zm.exe
- 'localhost':1039
- DNS ASK www.tr##irc.com
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'EDIT' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'