Техническая информация
- [<HKCU>\Software\Microsoft\Command Processor] 'AutoRun' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe"'
- [<HKCU>\Control Panel\Desktop] 'SCRNSAVE.EXE' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'forcedos' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'forcedos' = '"%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe"'
- %HOMEPATH%\Start Menu\Programs\Startup\forcedos.lnk
- '%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe'
- '<SYSTEM32>\wbem\wmic.exe' shadowcopy delete
- '<SYSTEM32>\ping.exe' -n 1 127.0.0.1
- '<SYSTEM32>\taskkill.exe' /f /im "<Имя вируса>.exe"
- '%APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe'
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im "<Имя вируса>.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "<Полный путь к вирусу>" > NUL
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\forcedos.exe
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\Component_01
- %APPDATA%\{EAD8C9EB-CE7E-1A35-C2EE-F26F5E13EB94}\Component_00
- %TEMP%\tmp1.tmp
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''