Техническая информация
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'ollydbg' WindowName: ''
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\s[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfxiaosan[1]
- 'www.ba##u.com':80
- 'www.cf###osan.com':80
- 'localhost':1036
- www.ba##u.com/s?tn#####################################################################
- www.cf###osan.com/jj.txt
- www.cf###osan.com/
- DNS ASK www.ba##u.com
- DNS ASK www.cf###osan.com
- '<IP-адрес в локальной сети>':1037
- ClassName: '' WindowName: 'QuickUnpack v2.1'
- ClassName: '' WindowName: 'RL!dePacker - Generic Unpacker'
- ClassName: '18467-41' WindowName: ''
- ClassName: 'ThunderRT6Form' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'SoftSnoopMainDialog' WindowName: ''
- ClassName: 'WinDbgFrameClass' WindowName: ''
- ClassName: '' WindowName: 'Syser : Active Hotkey [Ctrl+F12]'
- ClassName: '' WindowName: 'Syser Debugger - Win32 User Mode Debugger'
- ClassName: '' WindowName: 'Microsoft Spy++ - [???? 1]'
- ClassName: '' WindowName: 'APIScan'
- ClassName: '' WindowName: 'Raglstry Moniter - Sysexternals: www.sysexternals.com'
- ClassName: '' WindowName: '????????'