Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'msgsmgr' = '<SYSTEM32>\nbtsdump.exe'
- '<SYSTEM32>\attrib.exe' -r -s -h "<Полный путь к вирусу>"
- '<SYSTEM32>\cmd.exe' /c ""<Текущая директория>\193609.bat" "<Полный путь к вирусу>""
- '%WINDIR%\explorer.exe'
- <SYSTEM32>\dwwin.exe
- %WINDIR%\Explorer.EXE
- %TEMP%\32D6A.dmp
- <Текущая директория>\193609.bat
- <SYSTEM32>\nbtsdump.exe
- 'www.jr###tware.org':80
- 'localhost':1036
- www.jr###tware.org/files/is/license.txt
- DNS ASK www.jr###tware.org
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'BaseBar' WindowName: 'ChanApp'
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '(?' WindowName: '(?'
- ClassName: '??' WindowName: '??'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'X?' WindowName: 'X?'
- ClassName: '' WindowName: ''
- ClassName: 'H?' WindowName: 'H?'