Техническая информация
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\api[2].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\api[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\api[2].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\api[2].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\api[1].php
- C:\xinxin.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\api[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\api[1].php
- 'ww##.ctyyj.com':80
- 'www.ct##j.com':80
- 'b.###ne.qq.com':80
- 'localhost':1038
- www.ct##j.com/kss_api/api.php?a=#######################################################
- ww##.ctyyj.com/kss_api/api.php?a=######################################################
- b.###ne.qq.com/cgi-bin/blognew/blog_output_data?ui#############################
- DNS ASK ww##.ctyyj.com
- DNS ASK www.ct##j.com
- DNS ASK b.###ne.qq.com
- ClassName: '????????????' WindowName: '????????????'
- ClassName: '(null)' WindowName: 'taslogin.exe'