Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{D544C22D-1F70-4B1E-873D-D8DABEB26695}' = ''
- '%TEMP%\123.exe'
- '%TEMP%\server.exe'
- '%TEMP%\123.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\BT.BAT" "
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %TEMP%\裸体的赵薇.JPG
- 360tray.exe
- ClassName: 'AVP.Tray' WindowName: ''
- ClassName: '____AVP.Root' WindowName: ''
- %TEMP%\BT.BAT
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1].exe
- %TEMP%\123.exe
- %TEMP%\裸体的赵薇.JPG
- %TEMP%\server.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\atmQQ2.dll
- %TEMP%\server.exe
- 'www.ba##u.com':80
- 'localhost':1037
- www.ba##u.com/google.exe
- DNS ASK www.ba##u.com
- ClassName: 'ListBox' WindowName: 'dll_atm'
- ClassName: 'ListBox' WindowName: 'exe_atm'
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''