Техническая информация
- <SYSTEM32>\ping.exe 192.192.192.192 -n 1 -w 5000
- <SYSTEM32>\cmd.exe /C """%TEMP%\vii2.cmd"" "<Полный путь к вирусу>""
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.ad####netserver.biz/page.php?12##########################################################################
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\page[1].php
- %TEMP%\vii2.cmd
- %TEMP%\vii1.tmp
- %TEMP%\vii2.cmd
- 'www.ad####netserver.biz':80
- 'localhost':1038
- www.ad####netserver.biz/page.php?12##########################################################################
- DNS ASK www.ad####netserver.biz
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: 'SysAnalyzer'
- ClassName: '' WindowName: ''