Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\hideprocess] 'ImagePath' = '%TEMP%\14536. dll'
- [<HKLM>\SYSTEM\ControlSet001\Services\Mcg64] 'ImagePath' = '%TEMP%\~McgB9rSs.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\Mcg2.8] 'ImagePath' = '%TEMP%\~McgrcYFa.sys'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://hs####.cccpan.com
- <Полный путь к вирусу>
- %TEMP%\14536. dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\hs2887.cccpan[1]
- %TEMP%\~McgrcYFa.sys
- %TEMP%\~McgB9rSs.sys
- %TEMP%\~McgB9rSs.sys
- %TEMP%\~McgrcYFa.sys
- %TEMP%\~McgB9rSs.sys
- %TEMP%\~McgrcYFa.sys
- 'hs####.cccpan.com':80
- 'localhost':1040
- 'hs####.blog.163.com':80
- http://hs####.cccpan.com/
- http://hs####.blog.163.com/blog/static/22410502920143891127185/
- DNS ASK hs####.cccpan.com
- DNS ASK hs####.blog.163.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''