Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<Полный путь к вирусу>,'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '' = '<Полный путь к вирусу>'
- <SYSTEM32>\taskkill.exe /f /im explorer.exe
- <SYSTEM32>\taskkill.exe /f /im taskmgr.exe
- %WINDIR%\Explorer.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\opE4mh[1]
- 'bi#.ly':80
- 'localhost':1036
- bi#.ly/opE4mh
- DNS ASK bi#.ly
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'IEFrame' WindowName: ''