Техническая информация
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\haqiu03[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\haqiu03[2]
- <Текущая директория>\superec.ProcessMemory.sys
- <Текущая директория>\my.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\haqiu03[1]
- 'www.ha##u03.cn':80
- 'fc#####iu.blog.163.com':80
- 'localhost':1035
- www.ha##u03.cn/
- fc#####iu.blog.163.com/blog/static/192737113201171423954358/
- DNS ASK www.so##.com
- DNS ASK www.go###e.com.hk
- DNS ASK www.uc##9.cc
- DNS ASK www.30##kan.com
- DNS ASK www.ha##u03.cn
- DNS ASK fc#####iu.blog.163.com
- DNS ASK www.so##u.com
- DNS ASK www.ba##u.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''