Техническая информация
- '%TEMP%\windows.exe'
- '<SYSTEM32>\ping.exe' -n 0127.0.0.1
- '<SYSTEM32>\cmd.exe' /c %HOMEPATH%\Local Settings\Tempscratch.bat
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %HOMEPATH%\Local Settings\Temp2.jpg
- %TEMP%\autC.tmp
- %TEMP%\autD.tmp
- %TEMP%\autE.tmp
- %TEMP%\autB.tmp
- %TEMP%\aut8.tmp
- %TEMP%\aut9.tmp
- %TEMP%\autA.tmp
- %TEMP%\aut13.tmp
- %TEMP%\aut14.tmp
- %TEMP%\aut15.tmp
- %TEMP%\aut12.tmp
- %TEMP%\autF.tmp
- %TEMP%\aut10.tmp
- %TEMP%\aut11.tmp
- %TEMP%\aut7.tmp
- %TEMP%\windows.exe
- %TEMP%\windows.exe:Zone.Identifier
- %HOMEPATH%\Local Settings\Tempscratch.bat
- <Полный путь к вирусу>:Zone.Identifier
- %TEMP%\aut1.tmp
- %HOMEPATH%\Local Settings\Temp2.jpg
- %TEMP%\1VmfbgEPf1xUSURwBHNDsk016
- %TEMP%\aut4.tmp
- %TEMP%\aut5.tmp
- %TEMP%\aut6.tmp
- %TEMP%\aut3.tmp
- %HOMEPATH%\Recent\Temp2.lnk
- %TEMP%\aut2.tmp
- %HOMEPATH%\Recent\Local Settings.lnk
- %TEMP%\windows.exe
- <Полный путь к вирусу>
- %TEMP%\autE.tmp
- %TEMP%\autF.tmp
- %TEMP%\autD.tmp
- %TEMP%\autB.tmp
- %TEMP%\autC.tmp
- %TEMP%\aut10.tmp
- %TEMP%\aut14.tmp
- %TEMP%\aut15.tmp
- %TEMP%\aut13.tmp
- %TEMP%\aut11.tmp
- %TEMP%\aut12.tmp
- %TEMP%\aut3.tmp
- %TEMP%\aut4.tmp
- %HOMEPATH%\Local Settings\Tempscratch.bat
- %TEMP%\aut1.tmp
- %TEMP%\aut2.tmp
- %TEMP%\aut5.tmp
- %TEMP%\aut9.tmp
- %TEMP%\autA.tmp
- %TEMP%\aut8.tmp
- %TEMP%\aut6.tmp
- %TEMP%\aut7.tmp
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: ''