Для корректной работы нашего сайта необходимо включить поддержку JavaScript в вашем браузере.
Trojan.Siggen18.50453
Добавлен в вирусную базу Dr.Web:
2022-09-24
Описание добавлено:
2022-09-26
Техническая информация
Для обеспечения автозапуска и распространения
Модифицирует следующие ключи реестра
[<HKLM>\Software\Classes\.NomPc\shell\open\command] '' = 'IEXPLORE.EXE http://www.4555.net/?newie'
[<HKLM>\Software\Classes\.NomTb\shell\open\command] '' = 'IEXPLORE.EXE http://www.11zuiduan.com/go/4555/taobao.html'
Создает или изменяет следующие файлы
Устанавливает следующие настройки сервисов
[<HKLM>\System\CurrentControlSet\Services\Kingsoft Antivirus WebShield Service] 'Start' = '00000002'
[<HKLM>\System\CurrentControlSet\Services\Kingsoft Antivirus WebShield Service] 'ImagePath' = 'C:\Documents and Settings\All Users\Application Data\Microsoft\huacai\wd\KSWebShield.exe'
Создает следующие сервисы
'Kingsoft Antivirus WebShield Service' C:\Documents and Settings\All Users\Application Data\Microsoft\huacai\wd\KSWebShield.exe
Вредоносные функции
Запускает на исполнение
'%ProgramFiles(x86)%\internet explorer\iexplore.exe' http://t.###666.com/info.mssql/?st#########
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 13:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%ALLUSERSPROFILE%\╫└├Вµ\*└└*.*"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\╫└├Вµ\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 23:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 18:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 16:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 15:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 13:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 12:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 11:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 09:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 08:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 07:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 05:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 02:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 22:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 20:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 22:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 00:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 21:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 20:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 19:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 18:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 17:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 16:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 15:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"
'%WINDIR%\syswow64\at.exe' 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "%HOMEPATH%\Application Data\Microsoft\Internet Explorer\Quick Launch\*xplore*.*"
'%WINDIR%\syswow64\at.exe' 12:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 11:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 10:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 09:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 08:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 07:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 05:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 02:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\at.exe' 14:01 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday "%CommonProgramFiles%\System\ado\system.cmd"
'%ProgramFiles(x86)%\internet explorer\iexplore.exe' http://www.45##.net/index2.html?hu####
Перехватывает функции
в браузерах
Процесс firefox.exe, модуль wininet.dll
Процесс iexplore.exe, модуль urlmon.dll
Процесс firefox.exe, модуль urlmon.dll
Процесс iexplore.exe, модуль advapi32.dll
Процесс iexplore.exe, модуль wininet.dll
Изменения в файловой системе
Создает следующие файлы
%TEMP%\~c706.bat
C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.exe
C:\documents and settings\all users\application data\kingsoft\kws\kws.ini
C:\documents and settings\all users\application data\microsoft\huacai\wd\kwssvc.log
%ProgramFiles%\internet explorer\tbgw.ico
%ProgramFiles%\winzp\tbgw.ico
%ProgramFiles%\winzp\fav.cmd
%ProgramFiles%\winzp\dsu.reg
%ProgramFiles%\winzp\mypc.vbs
%ProgramFiles%\winzp\361.cmd
%LOCALAPPDATA%\kwssp.dll
%ProgramFiles%\winzp\system.cmd
%ProgramFiles%\winzp\tb.cmd
%ProgramFiles%\winsoftware..\tbgw.ico
%ProgramFiles%\winsoftware..\dsu.reg
%ProgramFiles%\winsoftware..\mypc.vbs
%ProgramFiles%\winsoftware..\361.cmd
%ProgramFiles%\winsoftware..\system.cmd
%ProgramFiles%\winsoftware..\tool.cmd
%ProgramFiles%\winsoftware..\tb.cmd
%HOMEPATH%\applic~1\microsoft\intern~1\quick launch\internet expleror.nompc
C:\documents and settings\all users\application data\microsoft\huacai\wd\kswbc.dll
C:\documents and settings\all users\application data\microsoft\huacai\wd\kwsui.dll
C:\documents and settings\all users\application data\microsoft\huacai\wd\kwssp.dll
C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.dll
%LOCALAPPDATA%\tool.cmd
%LOCALAPPDATA%\baidu.lnh
%LOCALAPPDATA%\dns.cmd
%LOCALAPPDATA%\dsu.reg
%LOCALAPPDATA%\fav.cmd
%LOCALAPPDATA%\ie.reg
%LOCALAPPDATA%\in.exe
%LOCALAPPDATA%\kswbc.dll
%LOCALAPPDATA%\kswebshield.dll
%LOCALAPPDATA%\kswebshield.exe
%HOMEPATH%\favorites\╠╘▒ВЄ═В° - ╠╘ГєГ╬╥╧▓╗╢.nomtb
%ProgramFiles%\winzp\tool.cmd
%LOCALAPPDATA%\kws.ini
%LOCALAPPDATA%\lnh.reg
%LOCALAPPDATA%\mypc.lnh
%LOCALAPPDATA%\mypc.vbs
%LOCALAPPDATA%\pc36.reg
%LOCALAPPDATA%\pc36d.reg
%LOCALAPPDATA%\system.cmd
%LOCALAPPDATA%\tb.cmd
%LOCALAPPDATA%\tb.reg
%LOCALAPPDATA%\tbgw.ico
%LOCALAPPDATA%\361.cmd
%LOCALAPPDATA%\kwsui.dll
%HOMEPATH%\favorites\═В°╓╖╡╝║╜╒╛.nompc
Присваивает атрибут 'скрытый' для следующих файлов
%TEMP%\~c706.bat
C:\documents and settings\all users\application data\kingsoft\kws\kws.ini
Другое
Ищет следующие окна
ClassName: 'kws::OSUCWindowClass' WindowName: ''
ClassName: 'RegEdit_RegEdit' WindowName: ''
ClassName: 'MS_AutodialMonitor' WindowName: ''
ClassName: 'MS_WebCheckMonitor' WindowName: ''
ClassName: 'WorkerW' WindowName: ''
ClassName: 'ReBarWindow32' WindowName: ''
ClassName: 'Address Band Root' WindowName: ''
ClassName: 'ComboBoxEx32' WindowName: ''
ClassName: 'Static' WindowName: ''
Создает и запускает на исполнение
'C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.exe' -install
'C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.exe' -start
'C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.exe'
'C:\documents and settings\all users\application data\microsoft\huacai\wd\kswebshield.exe' -run
'%WINDIR%\syswow64\cmd.exe' /c %TEMP%\~C706.bat "<Полный путь к файлу>"' (со скрытым окном)
'%ProgramFiles(x86)%\internet explorer\iexplore.exe' http://t.###666.com/info.mssql/?st#########' (со скрытым окном)
Запускает на исполнение
'%WINDIR%\syswow64\cmd.exe' /c %TEMP%\~C706.bat "<Полный путь к файлу>"
'%WINDIR%\syswow64\attrib.exe' +r +h +s "C:\Documents and Settings\All Users\Application Data\kingsoft\kws\kws.ini"
'%WINDIR%\syswow64\regedit.exe' /s "%LOCALAPPDATA%\lnh.reg"
'%WINDIR%\syswow64\regedit.exe' /s "%LOCALAPPDATA%\IE.reg"
'%WINDIR%\syswow64\regedit.exe' /s "%LOCALAPPDATA%\TB.reg"
'%WINDIR%\syswow64\mshta.exe' vbscript:createobject("wscript.shell").run("""iexplore""http://t.###666.com/info.mssql/?st#########",0)(window.close)
'%WINDIR%\syswow64\sc.exe' config Schedule start= auto
'%WINDIR%\syswow64\net.exe' start "Task Scheduler"
'%WINDIR%\syswow64\net1.exe' start "Task Scheduler"
'%WINDIR%\syswow64\attrib.exe' +r +h +s "%CommonProgramFiles%\System\ado\system.cmd"
'%WINDIR%\syswow64\reg.exe' add HKEY_CLASSES_ROOT\VBSFile\DefaultIcon /v "" /t "REG_EXPAND_SZ" /d "<SYSTEM32>\mspaint.exe,0" /f
'%WINDIR%\syswow64\wscript.exe' lnk.vbs
Рекомендации по лечению
Windows
macOS
Linux
Android
В случае если операционная система способна загрузиться (в штатном режиме или режиме защиты от сбоев), скачайте лечащую утилиту Dr.Web CureIt! и выполните с ее помощью полную проверку вашего компьютера, а также используемых вами переносных носителей информации.
Если загрузка операционной системы невозможна, измените настройки BIOS вашего компьютера, чтобы обеспечить возможность загрузки ПК с компакт-диска или USB-накопителя. Скачайте образ аварийного диска восстановления системы Dr.Web® LiveDisk или утилиту записи Dr.Web® LiveDisk на USB-накопитель, подготовьте соответствующий носитель. Загрузив компьютер с использованием данного носителя, выполните его полную проверку и лечение обнаруженных угроз.
Выполните полную проверку системы с использованием Антивируса Dr.Web Light для macOS. Данный продукт можно загрузить с официального сайта Apple App Store .
Если мобильное устройство функционирует в штатном режиме, загрузите и установите на него бесплатный антивирусный продукт Dr.Web для Android Light . Выполните полную проверку системы и используйте рекомендации по нейтрализации обнаруженных угроз.
Если мобильное устройство заблокировано троянцем-вымогателем семейства Android.Locker (на экране отображается обвинение в нарушении закона, требование выплаты определенной денежной суммы или иное сообщение, мешающее нормальной работе с устройством), выполните следующие действия:
загрузите свой смартфон или планшет в безопасном режиме (в зависимости от версии операционной системы и особенностей конкретного мобильного устройства эта процедура может быть выполнена различными способами; обратитесь за уточнением к инструкции, поставляемой вместе с приобретенным аппаратом, или напрямую к его производителю);
после активации безопасного режима установите на зараженное устройство бесплатный антивирусный продукт Dr.Web для Android Light и произведите полную проверку системы, выполнив рекомендации по нейтрализации обнаруженных угроз;
выключите устройство и включите его в обычном режиме.
Подробнее о Dr.Web для Android
Демо бесплатно на 14 дней
Выдаётся при установке
Поздравляем!
Обменяйте их на скидку до 50% на покупку Dr.Web.
Получить скидку
Скачайте Dr.Web для Android
Бесплатно на 3 месяца
Все компоненты защиты
Продление демо через AppGallery/Google Pay
Если Вы продолжите использование данного сайта, это означает, что Вы даете согласие на использование нами Cookie-файлов и иных технологий по сбору статистических сведений о посетителях. Подробнее
OK