Техническая информация
- [<HKLM>\SOFTWARE\Classes\IE0\shell\open\command] '' = '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE '
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\xtg3\takesoft.exe'
- [<HKLM>\SOFTWARE\Classes\IE\shell\open\command] '' = '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://n21.83387.com/'
- расширений файлов
- '<SYSTEM32>\7174\ihu2qi3f.exe'
- '<SYSTEM32>\7174\takesoft.exe' <Полный путь к вирусу>===
- '%WINDIR%\regedit.exe' /s "%TEMP%\jia.reg"
- '<SYSTEM32>\ping.exe' 127.0.0.1 -n 1
- '<SYSTEM32>\taskkill.exe' /f /im ZhuDongFangyu.exe
- '%WINDIR%\regedit.exe' /s "<SYSTEM32>\7174\test.reg"
- <SYSTEM32>\7174\10.ico
- <SYSTEM32>\7174\9.ico
- <SYSTEM32>\7174\8.ico
- <SYSTEM32>\7174\dasoft.encode
- %TEMP%\jia.reg
- <SYSTEM32>\7174\ihu2qi3f.exe
- <SYSTEM32>\7174\test.reg
- <SYSTEM32>\7174\3.ico
- <SYSTEM32>\7174\2.ico
- <SYSTEM32>\7174\takesoft.exe
- <SYSTEM32>\7174\4.ico
- <SYSTEM32>\7174\7.ico
- <SYSTEM32>\7174\6.ico
- <SYSTEM32>\7174\5.ico
- <SYSTEM32>\7174\test.reg
- <SYSTEM32>\7174\ihu2qi3f.exe
- %TEMP%\jia.reg
- ClassName: 'Progman' WindowName: '(null)'
- ClassName: 'SHELLDLL_DefView' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'
- ClassName: 'RegEdit_RegEdit' WindowName: '(null)'