Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '360try7' = '"<Полный путь к вирусу>" 3.3'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\gtskinfo[1].aspx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\gtskinfo[1].aspx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\gtskinfo[1].aspx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\zhs[1].txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\gtskinfo[1].aspx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\gtskinfo[1].aspx
- 'ss###.banjia.la':80
- 'localhost':1036
- ss###.banjia.la/gtskinfo.aspx?ve##########
- ss###.banjia.la/zhs.txt
- ss###.banjia.la/gtskinfo.aspx?ve#########################################
- DNS ASK ss###.banjia.la
- '<IP-адрес в локальной сети>':1037
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''