Техническая информация
- [<HKLM>\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\open\command] '' = '<SYSTEM32>\TXPlatform.exe '
- '<SYSTEM32>\2011\svchost.exe'
- '<SYSTEM32>\2011\smss.exe'
- '<SYSTEM32>\TXPlatform.exe' <Полный путь к вирусу>===
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://cp#.#anwan.cc/get.asp?ma###########################################################################
- '%WINDIR%\regedit.exe' /s "%TEMP%\TempIE.reg"
- <SYSTEM32>\smss.exe
- <SYSTEM32>\2011\smss.exe
- %TEMP%\TempIE.reg
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\get[1].asp
- <SYSTEM32>\2011\svchost.exe
- <SYSTEM32>\dtadhost.dll
- <SYSTEM32>\f1drc1nr.dll
- %HOMEPATH%\Favorites\.url
- <SYSTEM32>\TXPlatform.exe
- %TEMP%\TempIE.reg
- 'cp#.#anwan.cc':80
- 'localhost':1035
- cp#.#anwan.cc/get.asp?ma###########################################################################
- DNS ASK cp#.#anwan.cc
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'ThunderRT6FormDC' WindowName: 'SCreatAd123520'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'ThunderRT6FormDC' WindowName: 'sCallCreatMutex_ByHD'
- ClassName: 'SHELLDLL_DefView' WindowName: '(null)'
- ClassName: 'Progman' WindowName: '(null)'
- ClassName: 'RegEdit_RegEdit' WindowName: '(null)'
- ClassName: 'SysListView32' WindowName: '(null)'