Техническая информация
- '%TEMP%\Action.exe'
- '%TEMP%\OneHitCf.exe'
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\1.tmp\Action.bat""
- %TEMP%\Action.exe
- %TEMP%\OneHitCf.exe
- %TEMP%\data.dat
- %TEMP%\1.tmp\Action.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\crossfire-megacheat[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\IRnYZ[1]
- %TEMP%\1.tmp\Action.bat
- 'localhost':1037
- 'localhost':1039
- 'cr#####re-megacheat.ru':80
- 'ad#.ly':80
- cr#####re-megacheat.ru/
- ad#.ly/IRnYZ
- DNS ASK cr#####re-megacheat.ru
- DNS ASK ad#.ly
- ClassName: 'EDIT' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'IEFrame' WindowName: '(null)'