这是一个木马程序,它会读取用户系统的一些配置信息,并制造后门,连接病毒作者指定的远程服务器,等待黑客连接。
在磁盘中释放出以下文件:
C:DOCUME~1SANDBOXLocal SettingsTemporary Internet Files
Application DataMicrosoftOffice
在注册表中创建了以下信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionssafeboxTray.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360rpt.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360tray.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360Safe.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSuperKiller.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsavp.com"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsavp.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
uniep.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsPFW.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsFYFireWall.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
fwmain.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
fwsrv.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKAVPF.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKPFW32.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
od32kui.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
od32.exe"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsNavapsvc.exe"
在注册表中设置了以下信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionssafeboxTray.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360rpt.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360tray.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options360Safe.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSuperKiller.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsavp.com" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsavp.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
uniep.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsPFW.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsFYFireWall.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
fwmain.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
fwsrv.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKAVPF.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKPFW32.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
od32kui.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Options
od32.exe" "Debugger" "ntsd -d"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsNavapsvc.exe" "Debugger" "ntsd -d"
病毒会连接作者指定的网址:
http://web.35623.com/91/tj.htm
域名:"web.35623.com" 端口:80 (TCP)
web.35623.com/91/tj.htm
病毒会通过以下途径传播:
病毒会利用网络进行传播