Техническая информация
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'ollydbg' WindowName: ''
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\gx[1].txt
- 'www.ho##286.com':80
- 'localhost':1036
- www.ho##286.com/msgqtb/blog/gx.txt
- DNS ASK www.ho##286.com
- '<IP-адрес в локальной сети>':1037
- ClassName: '' WindowName: 'QuickUnpack v2.1'
- ClassName: 'ThunderRT6Form' WindowName: ''
- ClassName: '18467-41' WindowName: ''
- ClassName: '' WindowName: 'RL!dePacker - Generic Unpacker'
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: 'GINA Logon'
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'WinDbgFrameClass' WindowName: ''
- ClassName: '' WindowName: 'Microsoft Spy++ - [???? 1]'
- ClassName: '' WindowName: 'Syser Debugger - Win32 User Mode Debugger'
- ClassName: '' WindowName: 'Syser : Active Hotkey [Ctrl+F12]'
- ClassName: '' WindowName: 'APIScan'
- ClassName: 'SoftSnoopMainDialog' WindowName: ''
- ClassName: '' WindowName: '????????'
- ClassName: '' WindowName: 'Raglstry Moniter - Sysexternals: www.sysexternals.com'