Техническая информация
- %TEMP%\<Имя вируса>.exe
- %WINDIR%\explorer.exe http://bb#.#ayouxi.com/index_35.html
- %WINDIR%\explorer.exe http://do##.haixjy.cn/
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index_35[1].html
- %WINDIR%\system\QQ2009.she
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\bbs.5ayouxi[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\down.haixjy[1]
- %TEMP%\$readtxttemp.txt
- %TEMP%\<Имя вируса>.exe
- %WINDIR%\system\Skin.dll
- %TEMP%\$webpath.txt
- %TEMP%\$webpath.txt
- %TEMP%\$readtxttemp.txt
- 'bb#.#ayouxi.com':80
- 'do##.haixjy.cn':80
- 'localhost':1036
- 'localhost':1037
- bb#.#ayouxi.com/
- do##.haixjy.cn/
- bb#.#ayouxi.com/index_35.html
- DNS ASK do##.haixjy.cn
- DNS ASK bb#.#ayouxi.com
- ClassName: 'IEFrame' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: 'Microsoft Internet Explorer'
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''