Техническая информация
- %CommonProgramFiles%\carss.exe "%CommonProgramFiles%\file.AAA" rukou
- <SYSTEM32>\xcopy.exe /y c:\gpt.txt <SYSTEM32>\GroupPolicy
- <SYSTEM32>\xcopy.exe /y c:\computer.txt <SYSTEM32>\GroupPolicy\Machine\Scripts
- <SYSTEM32>\gpupdate.exe /force
- %WINDIR%\regedit.exe /s C:\1.reg
- <SYSTEM32>\cscript.exe "%TEMP%\360safe.vbs"
- <SYSTEM32>\cmd.exe /c ""%PROGRAM_FILES%\sys.bat" "
- <SYSTEM32>\GroupPolicy\gpt.txt
- C:\computer.txt
- C:\gpt.txt
- %WINDIR%\window.txt
- %HOMEPATH%\ntuser.pol
- <SYSTEM32>\GroupPolicy\Machine\Scripts\computer.txt
- %CommonProgramFiles%\carss.exe
- %TEMP%\360safe.vbs
- C:\1.reg
- %PROGRAM_FILES%\sys.bat
- %TEMP%\140546_res.tmp
- %TEMP%\132765_res.tmp
- <SYSTEM32>\GroupPolicy\gpt.ini
- C:\gpt.txt
- C:\1.reg
- %TEMP%\360safe.vbs
- из <Полный путь к вирусу> в %CommonProgramFiles%\SqlServer.exe
- 'a2####4175.3322.org':168
- DNS ASK a2####4175.3322.org
- ClassName: 'RegEdit_RegEdit' WindowName: ''