Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SqlSever' = '%WINDIR%\WinSxS\sqlsever.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] ' ' = '%WINDIR%\WinSxS\sqlsever.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'userinit' = 'userinit.exe,RUNEXE32.EXE'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'WinSxSTray' = '<Полный путь к вирусу>'
- %WINDIR%\Tasks\GoogleUpdateTaskUserV.job
- %WINDIR%\WinSxS\sqlsever.exe
- <SYSTEM32>\schtasks.exe /create /sc minute /mo 60 /tn "GoogleUpdateTaskUserV" /tr "<Полный путь к вирусу>" /ru ""
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\w.web7b[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\w.web7b[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\login0[1].htm
- %TEMP%\136515_res.tmp
- %WINDIR%\WinSxS\web7b.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\w.web7b[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\w.web7b[1]
- %TEMP%\136515_res.tmp в %WINDIR%\WinSxS\sqlsever.exe
- 'w.##b7b.cn':80
- 'www.we##b.cn':80
- w.##b7b.cn/
- www.we##b.cn/banben.asp?ba########
- DNS ASK w.##b7b.cn
- DNS ASK www.we##b.cn
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''