Техническая информация
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.ca##iqu.com/?by
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfbingyue[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\caobiqu[1]
- %APPDATA%\E_UIEngine\90afea1eeb37be7a93471c36152ab43a\90afea1eeb37be7a93471c36152ab43a.jpg
- %APPDATA%\E_UIEngine\fcf37a0b166092fb7055393c232c7cdd\fcf37a0b166092fb7055393c232c7cdd.jpg
- из <Полный путь к вирусу> в <Текущая директория>\CF±щФВИ«ДЬНёКУёЁЦъ0318 - SP1.exe
- 'localhost':1042
- 'www.ca##iqu.com':80
- 'cf#####ue.blog.163.com':80
- 'localhost':1037
- 'www.cf###gyue.com':80
- www.ca##iqu.com/?by
- cf#####ue.blog.163.com/blog/static/216876029201311321729706/
- www.cf###gyue.com/
- DNS ASK www.ca##iqu.com
- DNS ASK cf#####ue.blog.163.com
- DNS ASK www.cf###gyue.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''