Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad] 'CDexe' = '{601D4B07-6776-46A8-A06E-D3C24E59E95C}'
- '<SYSTEM32>\reg.exe' delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" /v "CDexe" /f
- '<SYSTEM32>\reg.exe' delete "HKEY_CLASSES_ROOT\CLSID\{601D4B07-6776-46A8-A06E-D3C24E59E95C}\InProcServer32" /f
- '<SYSTEM32>\reg.exe' add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" /v "CDexe" /t REG_SZ /d "{601D4B07-6776-46A8-A06E-D3C24E59E95C}" /f
- '<SYSTEM32>\reg.exe' delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\KnownDLLs" /v usp10 /f
- '<SYSTEM32>\reg.exe' add "HKEY_CLASSES_ROOT\CLSID\{601D4B07-6776-46A8-A06E-D3C24E59E95C}\InProcServer32" /v "" /t REG_SZ /d "%PROGRAM_FILES%\Internet Explorer\SIGNUP\ieinfed.dll" /f
- '<SYSTEM32>\cmd.exe' /c "AAWFHRIEJL.cmd"
- '<SYSTEM32>\ntvdm.exe' -f -i1
- '<SYSTEM32>\rundll32.exe' "<Полный путь к вирусу>.index.dat",addRun
- '<SYSTEM32>\ping.exe' 127.0.0.1 -n 3
- '<SYSTEM32>\cmd.exe' /c cmd /c "AAWFHRIEJL.cmd"
- '<SYSTEM32>\cmd.exe' /c cmd /c cmd /c "AAWFHRIEJL.cmd"
- <Текущая директория>\AAWFHRIEJL.cmd
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- <Полный путь к вирусу>.index.dat
- %PROGRAM_FILES%\Internet Explorer\SIGNUP\ieinfed.dll
- %PROGRAM_FILES%\Internet Explorer\usp10.dll
- <Полный путь к вирусу>.index.dat
- <Текущая директория>\AAWFHRIEJL.cmd
- %WINDIR%\Temp\scs1.tmp
- %WINDIR%\Temp\scs2.tmp
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b6c.b70.380001'