Техническая информация
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\kakagg[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\s[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\5mwg[1]
- <Текущая директория>\superec.ProcessMemory.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\520yw[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\s[1]
- 'www.ba##u.com':80
- 'www.ka##gg.com':80
- 'www.5m##.com':80
- 'localhost':1035
- 'www.52##w.com':80
- 'www.cf##8.com':80
- www.ka##gg.com/
- www.ba##u.com/s?bs######################################################################################################################
- www.5m##.com/
- www.cf##8.com/1.txt
- www.52##w.com/
- www.ba##u.com/s?bs################################################################################
- DNS ASK www.ba##u.com
- DNS ASK www.ka##gg.com
- DNS ASK www.5m##.com
- DNS ASK www.cf##8.com
- DNS ASK www.52##w.com
- '<IP-адрес в локальной сети>':1036
- '<IP-адрес в локальной сети>':1037
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''