Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'tst040101' = '%ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\tst040101.lnk'
- %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\tst040101.exe "tst040101"
- %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\tst040101.exe Starttst040101
- <SYSTEM32>\rundll32.exe %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\wab32res.dll,ProtectIt 2924
- <SYSTEM32>\rundll32.exe %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\wab32res.dll,MainWork <Полный путь к вирусу>
- ClassName: 'TXGuiFoundation' WindowName: 'QQ2011'
- ClassName: 'TXGuiFoundation' WindowName: 'QQ2010'
- %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\tst040101.lnk
- %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\tst040101.exe
- %ALLUSERSPROFILE%\Application Data\InstallShield\tst040101\wab32res.dll
- 'bj#####0030.gicp.net':8000
- DNS ASK bj#####0030.gicp.net
- ClassName: '' WindowName: 'Run'
- ClassName: 'tst040101 C' WindowName: 'tst040101 T'
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Progman' WindowName: 'Program Manager'