Техническая информация
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.yd##ovie.cn
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.yd##ic.cn
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.yd##xt.cn
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\yd-pic[1]
- %WINDIR%\WinBaDao.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\fozao[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\Post[1].Asp&Mac=00-00-00-00-00-01
- <SYSTEM32>\urlmor.dll
- %WINDIR%\WinAdmin.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\yd-txt[1]
- <Полный путь к вирусу>
- 'www.yd##ic.cn':80
- 'localhost':1042
- 'www.fo##o.com':80
- 'ww##.ters2.cn':80
- 'www.yd##xt.cn':80
- 'localhost':1037
- 'localhost':1041
- 'localhost':1040
- ww##.ters2.cn/001/Post.Asp&Mac=00-00-00-00-00-01
- www.fo##o.com/
- www.yd##xt.cn/
- www.yd##ic.cn/
- DNS ASK www.yd##ovie.cn
- DNS ASK www.fo##o.com
- DNS ASK ww##.ters2.cn
- DNS ASK www.yd##xt.cn
- DNS ASK www.yd##ic.cn
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'