Техническая информация
- '<SYSTEM32>\schtasks.exe' /Create /TN "Update\WReadX" /XML "%APPDATA%\Roaming\ccgvig.xml"
- <SYSTEM32>\Tasks\Update\WReadX
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.dat
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.svr
- %APPDATA%\Roaming\wreadx.exe
- %APPDATA%\Roaming\ccgvig.xml
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.nfo
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.dat
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.svr
- <Полный путь к вирусу>
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.nfo
- %APPDATA%\Roaming\Microsoft\Windows\dhe9VqmbB\dhe9VqmbB.svr
- %APPDATA%\Roaming\ccgvig.xml
- DNS ASK of####.suroot.com
- DNS ASK dn#.##ftncsi.com
- DNS ASK of###p.mooo.com
- ClassName: 'Shell_TrayWnd' WindowName: ''