Техническая информация
- <Полный путь к вирусу>
- <Текущая директория>\my.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\google[1]
- %TEMP%\E_N4\shell.fne
- <Текущая директория>\superec.ProcessMemory.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\haqiu03[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\3000kan[1]
- %TEMP%\E_N4\iext.fnr
- %TEMP%\E_N4\eAPI.fne
- %TEMP%\E_N4\krnln.fnr
- %TEMP%\E_N4\iext2.fne
- %TEMP%\E_N4\iext5.fne
- %TEMP%\E_N4\spec.fne
- %TEMP%\E_N4\internet.fne
- %TEMP%\E_N4\HtmlView.fne
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[1]
- 'www.30##kan.com':80
- 'www.ha##u03.cn':80
- 'uc##9.cc':80
- 'www.so##.com':80
- 'www.ba##u.com':80
- 'localhost':1036
- 'fc#####iu.blog.163.com':80
- 'www.go##le.cn':80
- www.ba##u.com/s?wd##############################
- www.30##kan.com/
- uc##9.cc/
- fc#####iu.blog.163.com/blog/static/192737113201171423954358/
- www.go##le.cn/
- www.ha##u03.cn/
- DNS ASK www.30##kan.com
- DNS ASK www.so##.com
- DNS ASK uc##9.cc
- DNS ASK www.ha##u03.cn
- DNS ASK www.ba##u.com
- DNS ASK www.go##le.cn
- DNS ASK fc#####iu.blog.163.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''