Техническая информация
- <SYSTEM32>\takesoft.exe <Полный путь к вирусу>===
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.th##q.com/tong/get.asp?ma########################################################
- <SYSTEM32>\taskkill.exe /f /im ZhuDongFangyu.exe
- <SYSTEM32>\9.ico
- <SYSTEM32>\8.ico
- <SYSTEM32>\7.ico
- C:\RegTemp.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\get[1].asp
- <SYSTEM32>\10.ico
- <SYSTEM32>\3.ico
- <SYSTEM32>\2.ico
- <SYSTEM32>\takesoft.exe
- <SYSTEM32>\6.ico
- <SYSTEM32>\5.ico
- <SYSTEM32>\4.ico
- C:\RegTemp.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\get[1].asp
- 'www.th##q.com':80
- 'localhost':1037
- www.th##q.com/tong/get.asp?ma########################################################
- DNS ASK www.th##q.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''