Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\2584539408] 'Name' = '%TEMP%\2.tmp'
- [<HKLM>\SYSTEM\ControlSet001\Services\d5522940] 'imagepath' = '%WINDIR%\TEMP\3.tmp'
- <SYSTEM32>\spoolsv.exe
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1A10' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '{AEBA21FA-782A-4A90-978D-B72164C80120}' = '{1a,37,61,59,23,52,35,0c,7a,5f,20,17,2f,1e,1a,19,0e,2b,01,73,13,37,13,12...
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '{A8A88C49-5EB2-4990-A1A2-0876022C854F}' = '{1a,37,61,59,23,52,35,0c,7a,5f,20,17,2f,1e,1a,19,0e,2b,01,73,13,37,13,12...
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'currentlevel' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1601' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1400' = '00000000'
- %WINDIR%\Temp\3.tmp
- %TEMP%\1.tmp
- %WINDIR%\Temp\3.tmp
- <DRIVERS>\etc\hosts
- %TEMP%\2.tmp
- %TEMP%\1.tmp в %TEMP%\2.tmp
- из <Полный путь к вирусу> в %TEMP%\4.tmp