Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'HKCU' = ''
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{6T4T86E1-WI7L-T8Y8-TBLM-2085206WXWTD}] 'StubPath' = '%WINDIR%\install\Win32.exe Restart'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe ,%TEMP%\<Имя вируса>.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run] 'Policies' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'Policies' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HKLM' = ''
- '%WINDIR%\install\Win32.exe'
- '<SYSTEM32>\wscript.exe' "%TEMP%\mic.vbs"
- '<SYSTEM32>\svchost.exe'
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\svchost.exe
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- <Полный путь к вирусу>:Zone.Identifier
- %TEMP%\mic.vbs
- %WINDIR%\install\Win32.exe
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\mic.vbs
- %TEMP%\%USERNAME%7
- %TEMP%\mic.vbs
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- <SYSTEM32>\svchost.exe
- DNS ASK nu####.no-ip.biz
- ClassName: 'shell_traywnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''