Техническая информация
- '%TEMP%\WebBrowserPassView2.exe' /stext %TEMP%\WebBrowserPassView2.txt
- '%TEMP%\WebBrowserPassView3.exe' /stext %TEMP%\WebBrowserPassView3.txt
- '%TEMP%\WebBrowserPassView4.exe' /stext %TEMP%\WebBrowserPassView4.txt
- '%WINDIR%\by_s0lex_-_new_hack.exe'
- '%WINDIR%\Hack.exe'
- '%TEMP%\WebBrowserPassView1.exe' /stext %TEMP%\WebBrowserPassView1.txt
- %TEMP%\WebBrowserPassView3.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\get_xml[1]
- %TEMP%\WebBrowserPassView2.exe
- %TEMP%\WebBrowserPassView4.txt
- %TEMP%\WebBrowserPassView4.exe
- %TEMP%\WebBrowserPassView3.txt
- %WINDIR%\by_s0lex_-_new_hack.exe
- %TEMP%\$inst\temp_0.tmp
- %TEMP%\$inst\2.tmp
- %TEMP%\WebBrowserPassView1.txt
- %TEMP%\WebBrowserPassView1.exe
- %WINDIR%\Hack.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\get_xml[1]
- %TEMP%\$inst\temp_0.tmp
- 'sm##.gmail.com':587
- 'my###sung.ru':80
- my###sung.ru/get_xml?st###################################
- DNS ASK sm##.gmail.com
- DNS ASK my###sung.ru
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'