Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'test' = '<Полный путь к вирусу>'
- '<SYSTEM32>\reg.exe' add hklm\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v test /t REG_SZ /d <Полный путь к вирусу> /f
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'TRW2000 for Windows 9x'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\lookmember[1].asp
- %TEMP%\A423B173\$$$$$$$$.{D6277990-4C6A-11CF-8D87-00AA0060F5BF}\ $$$2\com1.{21EC2020-3AEA-1069-A2DD-08002B30309D}\{FADB037F-3446-4871-A9EF-9D8D6EB5433A}
- 'www.sz##co.com':80
- 'localhost':1036
- www.sz##co.com/admin/pm/lookmember.asp?m=################
- DNS ASK www.sz##co.com
- ClassName: 'TDeDeMainWindow' WindowName: '(null)'
- ClassName: 'ACPU' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'TWX2002 for Windows 9x'
- ClassName: '(null)' WindowName: 'RegmonClass'