病毒文件路径:C:\windows\system32\takopndw.dll
动态链接库文件,插入到可执行exe进程从而达到运行。
注册表键值达到开机自启动:
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager]
"PendingFileRenameOperations"=hex(7):5c,00,3f,00,3f,00,5c,00,43,00,3a,00,5c,00,\
77,00,69,00,6e,00,64,00,6f,00,77,00,73,00,5c,00,73,00,79,00,73,00,74,00,65,\
00,6d,00,33,00,32,00,5c,00,74...