Техническая информация
- [<HKLM>\SOFTWARE\Classes\IE0\shell\open\command] '' = '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE '
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\ft9u\takesoft.exe'
- [<HKLM>\SOFTWARE\Classes\IE\shell\open\command] '' = '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.369163.com'
- расширений файлов
- <SYSTEM32>\2300\phha2e9i.exe
- <SYSTEM32>\2300\takesoft.exe <Полный путь к вирусу>===
- %WINDIR%\regedit.exe /s ""%TEMP%\jia.reg""
- <SYSTEM32>\ping.exe 127.0.0.1 -n 1
- %WINDIR%\regedit.exe /s "<SYSTEM32>\2300\test.reg"
- <SYSTEM32>\taskkill.exe /f /im ZhuDongFangyu.exe
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://bb#.#ao122.info/get.asp?ma########################################################
- <SYSTEM32>\2300\10.ico
- <SYSTEM32>\2300\9.ico
- <SYSTEM32>\2300\8.ico
- %TEMP%\jia.reg
- <SYSTEM32>\2300\phha2e9i.exe
- <SYSTEM32>\2300\test.reg
- <SYSTEM32>\2300\7.ico
- <SYSTEM32>\2300\3.ico
- <SYSTEM32>\2300\2.ico
- <SYSTEM32>\2300\takesoft.exe
- <SYSTEM32>\2300\6.ico
- <SYSTEM32>\2300\5.ico
- <SYSTEM32>\2300\4.ico
- <SYSTEM32>\2300\test.reg
- <SYSTEM32>\2300\phha2e9i.exe
- %TEMP%\jia.reg
- ClassName: 'Progman' WindowName: ''
- ClassName: 'SHELLDLL_DefView' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'RegEdit_RegEdit' WindowName: ''