Техническая информация
- C:\microimagem\iINFD2.exe
- C:\microimagem\iINFD2.exe (загружен из сети Интернет)
- <SYSTEM32>\regsvr32.exe /s C:\microimagem\iDLL.dll
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://fa##u.com/mandingo-massacre-2-asa
- C:\microimagem\iDLLJUMPER.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\bm8e3f[1]
- C:\microimagem\iINFD2.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\bm8e3d[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\bm8e3b[1]
- C:\microimagem\iDLL.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\mandingo-massacre-2-asa[1]
- 'localhost':1038
- 'fa##u.com':80
- 'localhost':1035
- 'xr#.us':80
- xr#.us/bm8e3d
- xr#.us/bm8e3f
- xr#.us/bm8e3b
- fa##u.com/mandingo-massacre-2-asa
- DNS ASK fa##u.com
- DNS ASK xr#.us
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''