Техническая информация
- '<SYSTEM32>\reg.exe' add HKEY_CLASSES_ROOT\CLSID\{00000000-0000-0000-0000-000000000001}\InProcServer32
- '<SYSTEM32>\reg.exe' add HKEY_CLASSES_ROOT\CLSID\{00000000-0000-0000-0000-000000000001}\InProcServer32 /ve /t reg_expand_sz /d <SYSTEM32>\shdocvw.dll /f
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\reg.exe' add HKEY_CLASSES_ROOT\CLSID\{00000000-0000-0000-0000-000000000001}
- '<SYSTEM32>\regsvr32.exe' /u /s igfxpph.dll
- '<SYSTEM32>\reg.exe' delete HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers /f
- '<SYSTEM32>\reg.exe' add HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers\new /ve /d {D969A300-E7FF-11d0-A93B-00A0C90F2719}
- <SYSTEM32>\svchost.exe
- <Полный путь к вирусу>
- <Текущая директория>\hide.dll
- %TEMP%\Memory159531.res
- %TEMP%\lazycommon.dll
- <SYSTEM32>\PerfStringBackup.TMP
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- 'www.lo##6.com':80
- 'localhost':1036
- www.lo##6.com/
- DNS ASK www.lo##6.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''