Техническая информация
- '%TEMP%\nsk2.tmp\biSetup28906.exe' /initurl http://bi.##srv.com/init/<Имя вируса>/:uid:? /affid "-" /id "0" /name " " /uniqid <Имя вируса>
- '%TEMP%\nsk2.tmp\lzma.exe' "d" "%TEMP%\nsk2.tmp\bi.lza" "%TEMP%\nsk2.tmp\biSetup28906.exe"
- '%TEMP%\nsk2.tmp\ns3.tmp' "%TEMP%\nsk2.tmp\lzma.exe" "d" "%TEMP%\nsk2.tmp\bi.lza" "%TEMP%\nsk2.tmp\biSetup28906.exe"
- '<SYSTEM32>\wbem\wmic.exe' bios get serialnumber, version
- <SYSTEM32>\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof
- %TEMP%\tmp5.tmp
- %TEMP%\tmp4.tmp
- %TEMP%\tmp6.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\CA3I8N3P
- %TEMP%\nsk2.tmp\TempWmicBatchFile.bat
- <SYSTEM32>\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof
- %TEMP%\nsk2.tmp\biSetup28906.exe
- %TEMP%\nsk2.tmp\bi.dat
- %TEMP%\nsk2.tmp\config.lky
- %TEMP%\nsk2.tmp\lzma.exe
- %TEMP%\nsk2.tmp\DcryptDll.dll
- %TEMP%\nsk2.tmp\ns3.tmp
- %TEMP%\nsk2.tmp\nsExec.dll
- %TEMP%\nsk2.tmp\bi.lza
- %TEMP%\nsk2.tmp\nsExec.dll
- %TEMP%\nsk2.tmp\lzma.exe
- %TEMP%\tmp4.tmp
- %TEMP%\tmp6.tmp
- %TEMP%\tmp5.tmp
- %TEMP%\nsk2.tmp\DcryptDll.dll
- %TEMP%\nsk2.tmp\config.lky
- %TEMP%\nsk2.tmp\ns3.tmp
- %TEMP%\nsk2.tmp\bi.dat
- %TEMP%\nsk2.tmp\biSetup28906.exe
- %TEMP%\nsk2.tmp\bi.lza
- 'bi.##srv.com':80
- 'localhost':1035
- DNS ASK bi.##srv.com
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'