Техническая информация
- '<SYSTEM32>\reg.exe' ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "LocalizedString" /t REG_SZ /d "Internet Exploror" /f
- '<SYSTEM32>\reg.exe' ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "InfoTip" /t REG_SZ /d "▓щ╒╥▓в╧╘╩╛ Internet ╔╧╡─╨┼╧в║══°╒╛" /f
- '<SYSTEM32>\reg.exe' ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon" /ve /t REG_EXPAND_SZ /d "shdoclc.dll,0" /f
- '<SYSTEM32>\reg.exe' ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon"
- '<SYSTEM32>\reg.exe' ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t REG_DWORD /d 1 /f
- '<SYSTEM32>\cmd.exe' /c %TEMP%\~1.bat <Полный путь к вирусу>
- '<SYSTEM32>\reg.exe' ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' http://da##66.com/index2.html?do#####
- <LS_APPDATA>\winare.vbs
- <LS_APPDATA>\to.cmd
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\index2[1].html
- <LS_APPDATA>\msn.exe
- <LS_APPDATA>\361.cmd
- %TEMP%\~1.bat
- <LS_APPDATA>\is.cmd
- <LS_APPDATA>\Internet Exploror.lnk
- %TEMP%\~1.bat
- 'da##66.com':80
- 'localhost':1036
- http://da##66.com/index2.html?do#####
- DNS ASK da##66.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''