Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'macxg' = '%PROGRAM_FILES%\<Имя вируса>.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\qiyexinxiang[1].HTM
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\qiyexinxiang[1].HTM
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\qiyexinxiang[1].HTM
- %PROGRAM_FILES%\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\zhuangyouqshu[1].htm
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\qiyexinxiang[1].HTM
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\qiyexinxiang[1].HTM
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\qiyexinxiang[1].HTM
- '42#####.800013920.com':80
- 'localhost':1035
- 42#####.800013920.com/woocee/qiyexinxiang.HTM
- 42#####.800013920.com/woocee/zhuangyouqshu.htm?71##
- DNS ASK 42#####.800013920.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''