Техническая информация
- '%WINDIR%\W22.exe'
- '%WINDIR%\W11.exe'
- '%WINDIR%\W22.exe' (загружен из сети Интернет)
- '%WINDIR%\W11.exe' (загружен из сети Интернет)
- %WINDIR%\W11.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\W22[1].jpg
- %WINDIR%\W22.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\palavrasdeaudreyhepburn[1].jpg
- %WINDIR%\WMulher.pps
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\W11[1].jpg
- 'www.fi###actory.com':80
- 'localhost':1037
- www.fi###actory.com/file/b1h471c/n/W22.jpg
- www.fi###actory.com/file/b1h46fa/n/W11.jpg
- www.fi###actory.com/file/b1h46f4/n/palavrasdeaudreyhepburn.jpg
- DNS ASK www.fi###actory.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: '<Имя вируса>'
- ClassName: '' WindowName: ''