Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{235F808F-73A7-6142-79C8-53DBFAA26C32}] 'StubPath' = '%WINDIR%\mscndns.exe'
- %TEMP%\0503.exe
- %TEMP%\flowers.exe
- %TEMP%\~tmp.tmp <Полный путь к вирусу>
- <SYSTEM32>\cmd.exe /c ""%TEMP%\b.bat" "
- %WINDIR%\Explorer.EXE
- %TEMP%\0503.exe
- %TEMP%\flowers.exe
- <SYSTEM32>\d3d9caps.dat
- %WINDIR%\mscndns.exe
- %TEMP%\b.bat
- %TEMP%\~mstmp.cpt
- %TEMP%\Btflowers.exe~tmpms0503.tmp
- %TEMP%\~tmp.tmp
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\39a373d9-3b29-41bf-a630-bda23b8470b6
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
- %TEMP%\~tmp.tmp
- %TEMP%\0503.exe
- %TEMP%\Btflowers.exe~tmpms0503.tmp
- %TEMP%\~mstmp.cpt в %TEMP%\Btflowers.exe~tmpms0503.tmp
- 'www.cn####te.ns02.info':443
- DNS ASK www.cn####te.ns02.info
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'MS_WINHELP' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''