Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe,%PROGRAM_FILES%\Download Machine\D_Download Machine\<Имя вируса>.exe'
- '%PROGRAM_FILES%\Download Machine\S_Download Machine\<Имя вируса>.exe'
- '<SYSTEM32>\reg.exe' Add "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t "REG_SZ" /d "explorer.exe,%PROGRAM_FILES%\Download Machine\D_Download Machine\<Имя вируса>.exe" /f
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.ju###8.com:82/tongji/count.asp?ma#####################################################################################################
- '<SYSTEM32>\taskkill.exe' /f /pid 3048
- '<SYSTEM32>\cmd.exe' /c %TEMP%\CoppyStart.bat
- '<SYSTEM32>\ping.exe' -a 127.1
- '<SYSTEM32>\ping.exe' 127.1
- %PROGRAM_FILES%\Download Machine\S_Download Machine\<Имя вируса>.exe
- %TEMP%\CoppyStart.bat
- 'www.ju##08.com':82
- 'localhost':1036
- DNS ASK www.ju##08.com
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'