Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'box°ІИ«·юОс(ЅыЦ№ґЛПоїЙДЬИГПµНіОЮ·ЁЖф¶Ї)' = '%WINDIR%\Fonts\YYbox.exe'
- '%TEMP%\YyFangYu.exe'
- '%WINDIR%\Fonts\YYbox.exe'
- <Полный путь к вирусу>
- %TEMP%\YyFangYu.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\yy[1]
- %WINDIR%\Fonts\YYbox.exe
- <SYSTEM32>\PastlbN18.sys
- <SYSTEM32>\hide.sys
- %TEMP%\YyFangYu.exe
- <SYSTEM32>\hide.sys
- <SYSTEM32>\PastlbN18.sys
- 'yy.com':80
- 'localhost':1036
- yy.com/
- DNS ASK yy.com
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'DNFbox.exe'
- ClassName: '(null)' WindowName: 'boxFangYu.exe'