Техническая информация
- <SYSTEM32>\MSGSVR23.EXE
- <SYSTEM32>\cmd.exe /c <Текущая директория>\$$336699.bat
- <SYSTEM32>\regsvr32.exe /s <SYSTEM32>\0LESVR46.DLL
- <SYSTEM32>\0LESVR46.DLL
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\ShellHook_mir3[1].dll
- <SYSTEM32>\MSGSVR23.EXEmir3
- <Текущая директория>\$$336699.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\update_mir3[1].log
- <SYSTEM32>\MSGSVR23.EXE
- <Полный путь к вирусу>mir3
- %WINDIR%\NBTSTAT3.DLL
- <SYSTEM32>\0LESVR23.DLL
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\mir3_hook[1].dll
- %WINDIR%\NBTSTAT3.DLL
- <SYSTEM32>\MSGSVR23.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\update_mir3[1].log
- <SYSTEM32>\MSGSVR23.EXEmir3
- <Полный путь к вирусу>mir3
- 'www.go####nyi.com.cn':80
- 'localhost':1036
- www.go####nyi.com.cn/7005/GameSpy/update_mir3.log
- www.go####nyi.com.cn/7005/GameSpy/ShellHook_mir3.dll
- www.go####nyi.com.cn/7005/GameSpy/mir3_hook.dll
- DNS ASK www.go####nyi.com.cn
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'TAx20030813' WindowName: 'LegendHook20030813'
- ClassName: '' WindowName: 'LegendHook20030813'