Техническая информация
- <Текущая директория>\data.dll
- %WINDIR%\explorer.exe "http://www.sh##ngy.com"
- <Текущая директория>\data.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\shuangy[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\shuangy[1]
- %TEMP%\$readtxttemp.txt
- %TEMP%\.<Имя вируса>.exe
- %TEMP%\$webpath.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\shuangy[1]
- %TEMP%\$webpath.txt
- %TEMP%\$readtxttemp.txt
- 'localhost':1038
- 'www.sh##ngy.com':80
- 'localhost':1035
- www.sh##ngy.com/
- DNS ASK www.sh##ngy.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''