Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'intel-gma' = '%CommonProgramFiles%\System\finddirectdb.exe'
- <SYSTEM32>\ntvdm.exe -f -i1
- <SYSTEM32>\wscript.exe "%PROGRAM_FILES%\Windows Media Player\wmpench.vbs"
- %PROGRAM_FILES%\Windows Media Player\wmpenche.exe
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- %PROGRAM_FILES%\Windows Media Player\wmpench.dll
- %PROGRAM_FILES%\Windows Media Player\wmpench.vbs
- <SYSTEM32>\logoforwindows.gif
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\downdos[1].html
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- %PROGRAM_FILES%\Windows Media Player\wmpench.vbs
- из <Полный путь к вирусу> в %CommonProgramFiles%\System\finddirectdb.exe
- 'hi####.ns01.info':80
- 'localhost':1036
- hi####.ns01.info/downdos.html
- DNS ASK hi####.ns01.info
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b40.b44.390001'
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''