Техническая информация
- '%TEMP%\udgjur.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c %TEMP%\otbzmxc.bat
- '%TEMP%\udgjur.exe'
- '<SYSTEM32>\ping.exe' 127.0.0.1
- '<SYSTEM32>\cmd.exe' /c %TEMP%\rzukugv.bat
- '%TEMP%\uryoye.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://www.go##00.cn/index3.htm
- %TEMP%\qhnbqa.bat
- %TEMP%\otbzmxc.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\index3[1].htm
- %TEMP%\udgjur.exe
- %TEMP%\uryoye.exe
- %TEMP%\fryzgg.bat
- %TEMP%\rzukugv.bat
- %TEMP%\yhegoihb.bat
- %TEMP%\qhnbqa.bat в %TEMP%\yhegoihb.bat
- %TEMP%\fryzgg.bat в %TEMP%\fauxdvot.bat
- 'www.10##u.info':80
- 'www.go##00.cn':80
- 'localhost':1039
- 'localhost':1041
- http://www.go##00.cn/index3.htm
- http://www.10##u.info/tt.php
- DNS ASK www.go##00.cn
- DNS ASK www.10##u.info
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''