Техническая информация
- [<HKLM>\SOFTWARE\Classes\AllTypes\shell\open\command] '' = '"%WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.exe" "%1"'
- %WINDIR%\20110809\8u5yGDA25h5Pu85c\smss.exe
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.exe
- <SYSTEM32>\wscript.exe "%WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.vbs"
- %WINDIR%\regedit.exe /s regBHO.reg
- <SYSTEM32>\cmd.exe /c ""<Полный путь к вирусу>.bat" "
- <SYSTEM32>\regsvr32.exe /s XlKankan.dll
- <SYSTEM32>\cmd.exe /c ""%WINDIR%\20110809\8u5yGDA25h5Pu85c\smss.exe.bat" "
- <SYSTEM32>\cmd.exe /c ""%WINDIR%\20110809\5J25PYcr2iqaBIUP\script\Script.vbs.bat" "
- <SYSTEM32>\cmd.exe /c ""%WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.exe.bat" "
- <SYSTEM32>\xcopy.exe /c /q /y /i XlKankan.dll <SYSTEM32>
- <SYSTEM32>\cmd.exe /c ""%WINDIR%\20110809\5J25PYcr2iqaBIUP\script\reg.bat" "
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\Script.vbs.bat
- %WINDIR%\userid.txt
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.exe.bat
- <Полный путь к вирусу>.bat
- <SYSTEM32>\XlKankan.dll
- %WINDIR%\20110809\8u5yGDA25h5Pu85c\smss.exe.bat
- %WINDIR%\20110809\8u5yGDA25h5Pu85c\smss.exe
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\reg.bat
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.vbs
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\script.exe
- %WINDIR%\tao.ico
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\XlKankan.dll
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\regBHO.reg
- %WINDIR%\20110809\5J25PYcr2iqaBIUP\script\XlKankan.dll
- 'tj.##ppin.cn':80
- tj.##ppin.cnhttp://tj.vippin.cn/api/work.aspx?cm########################################################################################################
- DNS ASK tj.##ppin.cn
- ClassName: 'RegEdit_RegEdit' WindowName: ''