Техническая информация
- '<SYSTEM32>\taskkill.exe' /f /im "<Имя вируса>.exe"
- '<SYSTEM32>\ping.exe' -n 1 -w 3000 1.1.1.1
- '<SYSTEM32>\calc.exe'
- '<SYSTEM32>\rundll32.exe' shell32.dll,Control_RunDLL "%TEMP%\uwruyau.cpl",
- <SYSTEM32>\calc.exe
- %TEMP%\Cab5.tmp
- %TEMP%\Cab3.tmp
- %APPDATA%\id
- %TEMP%\uwruyau.cpl
- %TEMP%\Cab1.tmp
- %APPDATA%\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004
- %APPDATA%\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004
- %APPDATA%\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
- %APPDATA%\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
- %TEMP%\Cab5.tmp
- %TEMP%\Cab3.tmp
- %TEMP%\Cab1.tmp
- '20#.#8.164.29':80
- 'www.download.windowsupdate.com':80
- 'wp#d':80
- www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
- 20#.#8.164.29/sidm25/sids1.html
- wp#d/wpad.dat
- www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt
- DNS ASK www.download.windowsupdate.com
- DNS ASK wp#d
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''