Техническая информация
- <Полный путь к вирусу>
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\haqiu03[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[2]
- <Текущая директория>\superec.ProcessMemory.sys
- <Текущая директория>\my.sys
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\3000kan[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\uc999[1]
- 'uc##9.cc':80
- 'fc#####iu.blog.163.com':80
- 'www.ha##u03.cn':80
- 'localhost':1035
- 'www.30##kan.com':80
- uc##9.cc/
- fc#####iu.blog.163.com/blog/static/192737113201171423954358/
- www.30##kan.com/
- www.ha##u03.cn/
- DNS ASK uc##9.cc
- DNS ASK fc#####iu.blog.163.com
- DNS ASK www.30##kan.com
- DNS ASK www.ha##u03.cn
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''