Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{B03A4BE6-5E5A-483E-B9B3-C484D4B20B72}' = 'hook dll rising'
- <DRIVERS>\cdaudio.sys файлом <DRIVERS>\SET2.tmp
- %WINDIR%\AhnRpta.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ah1[1].txt
- <SYSTEM32>\dllcache\cdaudio.sys.new
- %TEMP%\ah1.txt
- %TEMP%\ah2.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\ah2[1].txt
- <SYSTEM32>\ahnoo0.dll
- \Device\HarddiskVolume1
- %WINDIR%\AhnRpta.exe
- <DRIVERS>\SET2.tmp
- <DRIVERS>\SET1.tmp
- %TEMP%\ah1.txt
- %TEMP%\ah2.txt
- <DRIVERS>\cdaudio.sys
- <DRIVERS>\SET1.tmp
- 'localhost':1038
- 'www.ba###yji.com':80
- 'localhost':1036
- www.ba###yji.com/1hg/ah2.txt
- www.ba###yji.com/1hg/ah1.txt
- DNS ASK www.ba###yji.com