Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe %WINDIR%\pchealth\DLLH0ST.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'KAV' = '%WINDIR%\java\SVCH0ST.EXE'
- '%WINDIR%\ddos.exe'
- '%WINDIR%\pchealth\DLLH0ST.EXE'
- '%WINDIR%\java\SVCH0ST.EXE'
- '%WINDIR%\ddos.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c <Текущая директория>\1.bat
- 360tray.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\ddos[1].exe
- C:\autorun.inf
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\relinson[1].htm
- %WINDIR%\ddos.exe
- C:\autorun.exe
- %WINDIR%\pchealth\DLLH0ST.EXE
- %WINDIR%\java\SVCH0ST.EXE
- <Текущая директория>\1.bat
- C:\autorun.inf
- C:\autorun.exe
- %WINDIR%\pchealth\DLLH0ST.EXE
- %WINDIR%\java\SVCH0ST.EXE
- %WINDIR%\ddos.exe
- <SYSTEM32>\wbem\Logs\wbemess.lo_
- C:\autorun.exe
- C:\autorun.inf
- 'uu##8.cn':80
- 'localhost':1040
- 'localhost':1036
- 'bo###ll.ath.cx':80
- uu##8.cn/relinson.htm
- bo###ll.ath.cx/ddos.exe
- DNS ASK uu##8.cn
- DNS ASK bo###ll.ath.cx
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''