Техническая информация
- <SYSTEM32>\ping.exe 192.192.192.192 -n 1 -w 5000
- <SYSTEM32>\cmd.exe /C """%TEMP%\vji1.cmd"" "<Полный путь к вирусу>""
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- %PROGRAM_FILES%\140656.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\banner3[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\banner2[1].php
- %TEMP%\smss.exe
- %TEMP%\vji1.cmd
- %TEMP%\loader.exe
- %PROGRAM_FILES%\120968.dat
- %TEMP%\vji1.cmd
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\banner2[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\banner3[1].php
- %PROGRAM_FILES%\120968.dat
- %PROGRAM_FILES%\140656.dat
- 'www.we####rtalkz.com':80
- 'localhost':1035
- www.we####rtalkz.com/banner2.php?q=############################################################################################
- www.we####rtalkz.com/banner3.php?q=##############################################################################################
- DNS ASK www.we####rtalkz.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''