Техническая информация
- %TEMP%\Injector_WL_www.codhacks.ru.exe
- <SYSTEM32>\ntvdm.exe -f -i1
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- %WINDIR%\Temp\scs2.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\hackstatus[1].php
- %WINDIR%\Temp\scs1.tmp
- %TEMP%\Injector_WL_ www.codhacks.ru.exe
- %TEMP%\Injector_WL_www.codhacks.ru.exe
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- 'www.ca####dutyhacks.com':80
- www.ca####dutyhacks.com/hackstatus.php
- DNS ASK www.ca####dutyhacks.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '18467-41' WindowName: ''
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-ac8.acc.390001'