Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'userinit' = '<SYSTEM32>\userinit.exe,%CommonProgramFiles%\Service Share\lsass.exe'
- <SYSTEM32>\reg.exe add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "<SYSTEM32>\userinit.exe,%CommonProgramFiles%\Service Share\lsass.exe" /f
- %CommonProgramFiles%\Service Share\readme.txt
- %CommonProgramFiles%\Service Share\lsass.exeX
- %CommonProgramFiles%\Service Share\lsass.exeX
- из <Полный путь к вирусу> в %CommonProgramFiles%\Service Share\lsass.exe
- 'se####-win6.info':80
- se####-win6.info/tracker/?up####
- se####-win6.info/tracker/?wi##
- se####-win6.info/tracker/?cl###############################
- DNS ASK se####-win6.info
- ClassName: 'ExploreWClass' WindowName: ''
- ClassName: 'CabinetWClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''