Technical Information
- %HOMEPATH%\Start Menu\Programs\Startup\360LX1.exe
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://pl##.tenoad.com/DirectLink.aspx?pl###########
- '%HOMEPATH%\Start Menu\Programs\Startup\360LX1.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://ne#.#gooad.com/DirectLink.aspx?pl###########
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://www.ew##ai.com/iclk/?zo##############
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://ww.###zhao99.com/union.html?P=####################################################################
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\3214[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\iclk[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\dnfduanku[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\5266[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\buhuiwg[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\kguigushi[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\lelev8[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\2VAZY7AN\DirectLink[1].aspx
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\union[1].html
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\KHMHGZ4F\iclk[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\YPORKZYZ\DirectLink[1].aspx
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\beifen[1].htm
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\6625[1]
- %HOMEPATH%\Local Settings\<INETFILES>\Content.IE5\U98D4X8H\1118-DnYCM[1].htm
- %HOMEPATH%\Start Menu\Programs\Startup\360LX1.exe
- 'www.dn###anku.com':80
- 'www.32#4.cn':80
- 'ne#.#gooad.com':80
- 'pl##.tenoad.com':80
- 'www.kg###ushi.com':80
- 'www.bu##iwg.com':80
- 'www.52#6.me':80
- 'www.le##v8.net':80
- 'localhost':1047
- 'localhost':1040
- 'www.ew##ai.com':80
- 'localhost':1036
- 'www.66#5.me':80
- 'localhost':1044
- 'ww.###zhao99.com':80
- 'localhost':1042
- 'localhost':1043
- http://www.32#4.cn/?la#####
- http://www.dn###anku.com/
- http://www.dn###anku.com/beifen.htm
- http://www.52#6.me/?la#####
- http://www.bu##iwg.com/
- http://www.kg###ushi.com/
- http://www.le##v8.net/?la#####
- http://www.ew##ai.com/iclk/?zo##############
- http://www.66#5.me/?39##
- http://www.66#5.me/soft/Dn_YCM/1118-DnYCM.htm
- http://ww.###zhao99.com/union.html?P=####################################################################
- http://www.66#5.me/
- http://pl##.tenoad.com/DirectLink.aspx?pl###########
- http://ne#.#gooad.com/DirectLink.aspx?pl###########
- DNS ASK www.52#6.me
- DNS ASK www.32#4.cn
- DNS ASK www.le##v8.net
- DNS ASK www.kg###ushi.com
- DNS ASK www.bu##iwg.com
- DNS ASK www.dn###anku.com
- DNS ASK www.ew##ai.com
- DNS ASK www.66#5.me
- DNS ASK ww.###zhao99.com
- DNS ASK pl##.tenoad.com
- DNS ASK ne#.#gooad.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: '360rp.exe'
- ClassName: '' WindowName: '360RPS.EXE'
- ClassName: '' WindowName: '360sd.exe'