Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '"%TEMP%\xxxwrp010yyzz\bin\javaw.exe"' = '"%TEMP%\xxxwrp010yyzz\bin\javaw.exe:*:enabled:@xpsp2res.dll,-22019"'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Полный путь к вирусу>' = '<Полный путь к вирусу>:*:enabled:@xpsp2res.dll,-22019'
- <SYSTEM32>\ntvdm.exe -f -i1
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- <SYSTEM32>\F010DA44BA4\explorer.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\track[1].php
- <SYSTEM32>\F010DA44BA4\explorer.exe.tmp
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- 'localhost':1041
- '18#.#5.74.19':80
- 18#.#5.74.19/hs/track.php?f=################################################################################################
- 18#.#5.74.19/hs/callback.php?a=###################
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b64.b68.3a0001'