Техническая информация
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.je##nsu.com/images/stories/dg_originals/n_01.php?MC######### / 1:51:38 AM
- <SYSTEM32>\regsvr32.exe /s "%WINDIR%\Flag.dll"
- <SYSTEM32>\wscript.exe /B "%HOMEPATH%\SoxL.vbe"
- %WINDIR%\Flag.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\n_01[1].php
- %HOMEPATH%\Loxt.tmp
- %HOMEPATH%\SoxL.vbe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\HOLSTER[1]
- %HOMEPATH%\Loxt.tmp
- %HOMEPATH%\SoxL.vbe
- 'localhost':1039
- 'www.je##nsu.com':80
- 'localhost':1037
- '50.##.222.171':80
- www.je##nsu.com/images/stories/dg_originals/n_01.php?MC############################
- 50.##.222.171/modules/mod_acepolls/HOLSTER
- DNS ASK www.je##nsu.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_WINHELP' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''