这是一个木马程序,它会读取用户系统的一些配置信息,并制造后门,连接病毒作者指定的远程服务器,等待黑客连接。
在磁盘中释放出以下文件:
C:WINDOWSSYSTEM32explorer.exe
C:WINDOWSSYSTEM32explorer.dll
在注册表中创建了以下信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotify"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer"
在注册表中设置了以下信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "DllName" "explorer.dll"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Asynchronous" ""
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Impersonate" ""
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Lock" "WLELock"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Logoff" "WLELogoff"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Logon" "WLELogon"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Shutdown" "WLEShutdown"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "StartScreenSaver" "WLEStartScreenSaver"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Startup" "WLEStartup"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "StopScreenSaver" "WLEStopScreenSaver"
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifyexplorer" "Unlock" "WLEUnlock"
会从以下注册表中读取信息:
"HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogon"
病毒会连接作者指定的网址:
域名:"ahmad-58.dyndns.org" 端口:3460 (IP)
域名:"ahmad-58.no-ip.org" 端口:3460 (IP)
域名:"ahmad1111.no-ip.org" 端口:3460 (IP)
在系统中创建了以下进程:
"explorer.exe"
病毒会通过以下途径传播:
病毒会修改硬盘中存在的可执行文件