Техническая информация
- %PROGRAM_FILES%\ComPlus Applications\takesoft.exe <Полный путь к вирусу>===
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://un###.125wa.com/get.asp?ma#############################################################################################
- <SYSTEM32>\taskkill.exe /f /im ZhuDongFangyu.exe
- %PROGRAM_FILES%\ComPlus Applications\10.ico
- %PROGRAM_FILES%\ComPlus Applications\9.ico
- %PROGRAM_FILES%\ComPlus Applications\8.ico
- %PROGRAM_FILES%\ComPlus Applications\11.ico
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\125wa[1]
- %PROGRAM_FILES%\ComPlus Applications\13.ico
- %PROGRAM_FILES%\ComPlus Applications\12.ico
- %PROGRAM_FILES%\ComPlus Applications\3.ico
- %PROGRAM_FILES%\ComPlus Applications\2.ico
- %PROGRAM_FILES%\ComPlus Applications\takesoft.exe
- %PROGRAM_FILES%\ComPlus Applications\4.ico
- %PROGRAM_FILES%\ComPlus Applications\7.ico
- %PROGRAM_FILES%\ComPlus Applications\6.ico
- %PROGRAM_FILES%\ComPlus Applications\5.ico
- 'www.12##a.com':80
- 'localhost':1034
- www.12##a.com/
- DNS ASK www.12##a.com
- '<IP-адрес в локальной сети>':1035
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'IEFrame' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''