Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'jsf8uiw3jnjgffght' = '<Полный путь к вирусу>'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'jsf8uiw3jnjgffght' = '<Полный путь к вирусу>'
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %TEMP%\1176971052.exe
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- %TEMP%\fdsg43jndghgdgf.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cd[1].php
- %TEMP%\1166971052.exe
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- %TEMP%\1166971052.exe
- %TEMP%\1176971052.exe
- 'je##.name':80
- 'localhost':1036
- je##.name/cd/cd.php?id########################
- DNS ASK je##.name
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b8c.b90.380001'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'jdf983jkfdodfld' WindowName: 'ghjfghfjjjhf0'