Техническая информация
- '<SYSTEM32>\dumprep.exe' 2452 -dm 7 7 %TEMP%\WERecb2.dir00\cmd.exe.mdmp 16325836412028688
- '<SYSTEM32>\dumprep.exe' 2452 -dm 7 7 %TEMP%\WERecb2.dir00\cmd.exe.hdmp 16325836412028676
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\sysdm.cpl,NoExecuteProcessException <SYSTEM32>\cmd.exe
- '<SYSTEM32>\schtasks.exe' /create /sc onlogon /tn "update" /rl highest /tr "'%ProgramFiles%\Windows Files\winupdate.exe' /startup" /f
- '<SYSTEM32>\dumprep.exe' 1664 -dm 7 7 %TEMP%\WERbac1.dir00\ctfmon.exe.mdmp 16325836412027256
- '<SYSTEM32>\dumprep.exe' 1664 -dm 7 7 %TEMP%\WERbac1.dir00\ctfmon.exe.hdmp 16325836412027276
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\sysdm.cpl,NoExecuteProcessException <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\services.exe
- %TEMP%\WERecb2.dir00\cmd.exe.hdmp
- %TEMP%\WERecb2.dir00\cmd.exe.mdmp
- %TEMP%\WERecb2.dir00\manifest.txt
- %TEMP%\WERecb2.dir00\appcompat.txt
- %TEMP%\WERbac1.dir00\ctfmon.exe.hdmp
- %TEMP%\WERbac1.dir00\ctfmon.exe.mdmp
- %TEMP%\WERbac1.dir00\manifest.txt
- %TEMP%\WERbac1.dir00\appcompat.txt
- из <Полный путь к вирусу> в %ProgramFiles%\Windows Files\winupdate.exe
- 'kb###7.ddns.net':49543
- 'kb######uminosity.ddns.net':49543
- DNS ASK kb###7.ddns.net
- DNS ASK kb######uminosity.ddns.net
- ClassName: 'Shell_TrayWnd' WindowName: ''