Техническая информация
- <Текущая директория>\d6050.exe -r
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://a1.#dlfs.cn/down7/ac/?s=########################################### 2:05:17 PM&v=C1ADE2E3B0B2A2E9&n=C59AC1BBB5D9B7C6B9D6C8B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B175B2BABBB4BAADADA5B674BAADB775B3AFB7A4B373B8A6ABA5A6B375B1BA7AB3B7AEA5A4B5AAB8ADA3AFA2B1A8ABB4B1
- <SYSTEM32>\cmd.exe /c <Текущая директория>\<Имя вируса>tmp.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\CAXGWF1H
- <Текущая директория>\<Имя вируса>tmp.bat
- <Текущая директория>\d6050.exe
- 'a1.#dlfs.cn':80
- 'localhost':1037
- DNS ASK a1.#dlfs.cn
- '<IP-адрес в локальной сети>':1038
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''