Техническая информация
- [<HKLM>\SOFTWARE\Classes\IE\shell\open\command] '' = '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE '
- расширений файлов
- %WINDIR%\takesoft.exe <Полный путь к вирусу>===
- <SYSTEM32>\ping.exe 127.0.0.1 -n 1
- <SYSTEM32>\taskkill.exe /f /im ZhuDongFangyu.exe
- <SYSTEM32>\10.ico
- <SYSTEM32>\9.ico
- <SYSTEM32>\8.ico
- %TEMP%\6iy5ny66.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tget[1]
- %WINDIR%\dasoft.encode
- <SYSTEM32>\7.ico
- <SYSTEM32>\3.ico
- <SYSTEM32>\2.ico
- %WINDIR%\takesoft.exe
- <SYSTEM32>\6.ico
- <SYSTEM32>\5.ico
- <SYSTEM32>\4.ico
- %TEMP%\6iy5ny66.exe
- 'tg##.asp':80
- 'localhost':1035
- tg##.asp/?ma####################################################
- DNS ASK tg##.asp
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Progman' WindowName: ''
- ClassName: 'SHELLDLL_DefView' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''