Техническая информация
- %PROGRAM_FILES%\pointerer\pointerer.exe (загружен из сети Интернет) <Имя вируса>.exe^<Текущая директория>
- <SYSTEM32>\cmd.exe /c ""%PROGRAM_FILES%\pointerer\bat1.bat" "
- <SYSTEM32>\MSINET.OCX
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\MSINET[1].OCX
- <SYSTEM32>\VB6KO.DLL
- %PROGRAM_FILES%\pointerer\pointerer.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pointerer_7[1].exe
- %PROGRAM_FILES%\pointerer\bat1.bat
- <Текущая директория>\fload.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\exefileall[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\VB6KO[1].DLL
- <SYSTEM32>\INETKO.DLL
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\INETKO[1].DLL
- %TEMP%\~DF9A81.tmp
- %PROGRAM_FILES%\pointerer\bat1.bat
- <Текущая директория>\fload.dll
- 'www.ws###rch.net':80
- 'localhost':1035
- www.ws###rch.net/download/dll/MSINET.OCX
- www.ws###rch.net/download/exe/ver10/pointerer_7.exe
- www.ws###rch.net/download/dll/VB6KO.DLL
- www.ws###rch.net/asp/exefileall.php
- www.ws###rch.net/download/dll/INETKO.DLL
- DNS ASK www.ws###rch.net
- '<IP-адрес в локальной сети>':1036