Техническая информация
- %TEMP%\kingsoftkonline\KINSTALLERS_66_4417.exe /s
- %WINDIR%\Temp\KINSTALLERS_66_4417.exe
- %WINDIR%\Temp\aircrack-ngwin.exe
- %TEMP%\kingsoftkonline\KINSTALLERS_66_4417.exe (загружен из сети Интернет)
- %WINDIR%\Temp\aircrack-ng-1.1-win\bin\cygz.dll
- %WINDIR%\Temp\aircrack-ng-1.1-win\bin\cygwin1.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\3qv0t[1]
- %TEMP%\kingsoftkonline\KINSTALLERS_66_4417.exe.tmp
- %WINDIR%\Temp\KINSTALLERS_66_4417.exe
- %WINDIR%\Temp\aircrack-ngwin.exe
- %WINDIR%\Temp\aircrack-ng-1.1-win\bin\aircrack-ng.exe
- %WINDIR%\Temp\aircrack-ng-1.1-win\bin\cyggcc_s-1.dll
- %WINDIR%\Temp\aircrack-ng-1.1-win\bin\cygcrypto-0.9.8.dll
- %TEMP%\kingsoftkonline\KINSTALLERS_66_4417.exe.tmp в %TEMP%\kingsoftkonline\KINSTALLERS_66_4417.exe
- 'bo.###a.net:8080':80
- 'cd###.www.duba.net':80
- 'localhost':1036
- 're#.so':80
- cd###.www.duba.net/duba/install/2011/ever/fkavsetups_66_0.exe
- bo.###a.net:8080/pagetracer2/duba/__utm.gif?01#####################################################################################################################
- re#.so/3qv0t
- DNS ASK cd###.www.duba.net
- DNS ASK bo.###a.net:8080
- DNS ASK re#.so
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'EDIT' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''