Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '' = '<Полный путь к вирусу>'
- <SYSTEM32>\netsh.exe advfirewall firewall add rule name="System Thread" protocol=TCP dir =out action=allow
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'GBDYLLO' WindowName: ''
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: 'pediy06' WindowName: ''
- ClassName: 'gdkWindowToplevel' WindowName: ''
- %PROGRAM_FILES%\Microsoft Thread Control\.exe
- 'any':0
- ClassName: 'TfMain' WindowName: ''
- ClassName: '' WindowName: 'ProcNetMonitor - www.SecurityXploded.com'
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: '' WindowName: '??? ??'
- ClassName: '' WindowName: 'Process Viewer'
- ClassName: 'TnetstatMain' WindowName: ''
- ClassName: '' WindowName: 'Microsoft Thread Control'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '18467-41' WindowName: ''
- ClassName: 'PROCEXPL' WindowName: ''
- ClassName: 'SocketSniff' WindowName: ''
- ClassName: 'ProcessHacker' WindowName: ''