Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\SRTSBXZZ] 'Start' = '00000002'
- %PROGRAM_FILES%\Windows Work\SRTSBXZZ.exe 1
- %PROGRAM_FILES%\Windows NT\file.exe -w REG -p "Filter" -r "Block TCP" -f 124.238.244.*:*+0:*:TCP -n BLOCK -x
- %PROGRAM_FILES%\Windows NT\tt.exe -run
- <SYSTEM32>\cmd.exe /c "%PROGRAM_FILES%\Windows NT\t.bat"
- %PROGRAM_FILES%\Windows NT\t.bat
- %PROGRAM_FILES%\Windows Work\SRTSBXZZ.exe
- %PROGRAM_FILES%\Windows Work\TmpSRTSBXZZ.exe.dat
- %PROGRAM_FILES%\Windows NT\tt.exe
- %PROGRAM_FILES%\Windows NT\file.exe
- %PROGRAM_FILES%\Windows NT\winipsec.dll
- %PROGRAM_FILES%\Windows NT\t.bat
- %PROGRAM_FILES%\Windows Work\SRTSBXZZ.exe
- %PROGRAM_FILES%\Windows NT\file.exe
- %PROGRAM_FILES%\Windows NT\winipsec.dll
- %PROGRAM_FILES%\Windows Work\TmpSRTSBXZZ.exe.dat в %PROGRAM_FILES%\Windows Work\SRTSBXZZ.exe
- из <Полный путь к вирусу> в %TEMP%\169671.dat
- ClassName: 'Shell_TrayWnd' WindowName: ''