Техническая информация
- %PROGRAM_FILES%\Windows\system.exe
- <SYSTEM32>\cacls.exe "%PROGRAM_FILES%\Windows\system.exe" /P users:R
- <SYSTEM32>\attrib.exe "%PROGRAM_FILES%\Windows\system.exe" +R
- <SYSTEM32>\cacls.exe "%PROGRAM_FILES%\Windows\shell.vbs" /P users:R
- <SYSTEM32>\attrib.exe "%PROGRAM_FILES%\Windows\shell.vbs" +R
- <SYSTEM32>\attrib.exe +h "C:\shell.vbs"
- <SYSTEM32>\attrib.exe +h "%PROGRAM_FILES%\Windows"
- <SYSTEM32>\cmd.exe /c ""<SYSTEM32>\qx.bat" "
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.ym##ku.com/xg/?ta#
- <SYSTEM32>\qx.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\xg[1]
- %PROGRAM_FILES%\Windows\system.txt
- %PROGRAM_FILES%\Windows\shell.sys
- C:\shell.vbs
- C:\shell.vbs
- 'www.ym##ku.com':80
- 'localhost':1036
- www.ym##ku.com/xg/?ta#
- DNS ASK www.ym##ku.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''