Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\SRAT_Service] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\Made in China DDoS] 'Start' = '00000002'
- '<SYSTEM32>\ntserver.exe'
- '%TEMP%\DDoS.exe'
- '%TEMP%\热血传奇疾风经验外挂.exe'
- '<SYSTEM32>\svchost.exe' -k netsvcs
- iexplore.exe
- <SYSTEM32>\ntserver.exe
- <SYSTEM32>\ntserver.dll
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\redir[1].0&ar=home
- C:\Documents and Settings\LocalService\Favorites\Desktop.ini
- %TEMP%\DDoS.exe
- %TEMP%\热血传奇疾风经验外挂.exe
- <DRIVERS>\etc\Ams5gwrf.dll
- <SYSTEM32>\J8iBD8RNYk.ini
- C:\Documents and Settings\LocalService\Favorites\Desktop.ini
- <SYSTEM32>\ntserver.exe
- %TEMP%\DDoS.exe
- '20#.#6.232.182':80
- 'me####ziya.3322.org':8800
- 'aa##.3322.org':8888
- 'localhost':1039
- 20#.#6.232.182/isapi/redir.dll?pr##################################
- DNS ASK me####ziya.3322.org
- DNS ASK www.microsoft.com
- DNS ASK aa##.3322.org
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''