Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'xsjfn83jkemfofght' = '<Полный путь к вирусу>'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'xsjfn83jkemfofght' = '<Полный путь к вирусу>'
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %TEMP%\1090462420.exe
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- %TEMP%\ksf8kjrgdfrrt.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cd[1].php
- %TEMP%\1080462420.exe
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- %TEMP%\1080462420.exe
- %TEMP%\1090462420.exe
- 'bu###ydream.biz':80
- 'localhost':1037
- bu###ydream.biz/cd/cd.php?id########################
- DNS ASK bu###ydream.biz
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b50.b54.380001'
- ClassName: 'ikserf83ijedfld' WindowName: 'gwkjdef983iwjmkdef0'
- ClassName: 'Indicator' WindowName: '(null)'