Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'КдИл·ЁПа№Ш№¤ѕЯ' = '%WINDIR%\svchost.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\response[2].asp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\response[1].asp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\response[1].asp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\response[2].asp
- из <Полный путь к вирусу> в %WINDIR%\svchost.exe
- 'au##.#earch.msn.com':80
- 'localhost':1041
- 'www.vv##ak.com':80
- www.vv##ak.com/kf/dd3.txt
- www.vv##ak.com/kf/dd4.txt
- au##.#earch.msn.com/response.asp?MT###########################
- www.vv##ak.com/kf/dd1.txt
- www.vv##ak.com/kf/dd2.txt
- DNS ASK au##.#earch.msn.com
- DNS ASK www.vv##ak.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''