Техническая информация
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\loadita[1].jpg
- <SYSTEM32>\nethotlive.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\nethotlive[1].jpg
- <SYSTEM32>\regdllhelper.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\regdllhelper[1].jpg
- <SYSTEM32>\loadita.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\mcitane[1].jpg
- <SYSTEM32>\javahelper.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\javahelper[1].jpg
- <SYSTEM32>\hunteremail.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\hunteremail[1].jpg
- <SYSTEM32>\mcitane.jpg
- <Полный путь к вирусу>
- 'sh#####h.tempsite.ws':80
- 'localhost':1036
- sh#####h.tempsite.ws/web/projeto/nethotlive.jpg
- sh#####h.tempsite.ws/web/projeto/loadita.jpg
- sh#####h.tempsite.ws/web/projeto/regdllhelper.jpg
- sh#####h.tempsite.ws/web/projeto/javahelper.jpg
- sh#####h.tempsite.ws/web/projeto/mcitane.jpg
- sh#####h.tempsite.ws/web/projeto/hunteremail.jpg
- DNS ASK sh#####h.tempsite.ws