Техническая информация
- <SYSTEM32>\notepad.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\pingits[1].jpg
- <SYSTEM32>\pingwab.jpg
- <SYSTEM32>\pingits.jpg
- <SYSTEM32>\pingnt.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pingnt[1].jpg
- <SYSTEM32>\pingweb.jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pingweb[1].jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\pingrel[1].jpg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\pingwab[1].jpg
- <SYSTEM32>\pingrel.jpg
- <Полный путь к вирусу>
- 'www.pc#####uranca.com.br':80
- 'localhost':1035
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingits.jpg
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingnt.jpg
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingkil.jpg
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingweb.jpg
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingrel.jpg
- www.pc#####uranca.com.br/img/hp/navig/imagens/pingwab.jpg
- DNS ASK www.pc#####uranca.com.br
- '<IP-адрес в локальной сети>':1036
- ClassName: 'Shell_TrayWnd' WindowName: ''