Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MyApp' = '%WINDIR%\host.exe'
- bdagent.exe
- zlclient.exe
- AVP.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\m0nst3rh4cks[1]
- из <Полный путь к вирусу> в %WINDIR%\svchost.exe
- 'www.m0###3rh4cks.tk':80
- 'localhost':1035
- www.m0###3rh4cks.tk/
- DNS ASK www.m0###3rh4cks.tk
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'IEFrame' WindowName: ''