Техническая информация
- '%TEMP%\nsl2.tmp\biSetup4478.exe' /initurl http://bi.##srv.com/:affid:/:sid:/:uid:? /affid "etype" /id "etype" /name "eType" /uniqid <Имя вируса>
- '%TEMP%\nsl2.tmp\lzma.exe' "d" "%TEMP%\nsl2.tmp\bi.lza" "%TEMP%\nsl2.tmp\biSetup4478.exe"
- '%TEMP%\nsl2.tmp\ns3.tmp' "%TEMP%\nsl2.tmp\lzma.exe" "d" "%TEMP%\nsl2.tmp\bi.lza" "%TEMP%\nsl2.tmp\biSetup4478.exe"
- '<SYSTEM32>\wbem\wmic.exe' bios get serialnumber, version
- %TEMP%\tmp5.tmp
- <SYSTEM32>\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof
- %TEMP%\nsl2.tmp\biSetup4478.exe
- %TEMP%\tmp4.tmp
- %TEMP%\nsl2.tmp\TempWmicBatchFile.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\CAH8ORTL
- %TEMP%\tmp6.tmp
- <SYSTEM32>\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof
- %TEMP%\nsl2.tmp\ns3.tmp
- %TEMP%\nsl2.tmp\config.lky
- %TEMP%\nsl2.tmp\config.ini
- %TEMP%\nsl2.tmp\System.dll
- %TEMP%\nsl2.tmp\lzma.exe
- %TEMP%\nsl2.tmp\bi.lza
- %TEMP%\nsl2.tmp\nsExec.dll
- %TEMP%\nsl2.tmp\bi.dat
- %TEMP%\nsl2.tmp\DcryptDll.dll
- %TEMP%\nsl2.tmp\System.dll
- %TEMP%\nsl2.tmp\nsExec.dll
- %TEMP%\nsl2.tmp\lzma.exe
- %TEMP%\tmp6.tmp
- %TEMP%\tmp5.tmp
- %TEMP%\tmp4.tmp
- %TEMP%\nsl2.tmp\DcryptDll.dll
- %TEMP%\nsl2.tmp\bi.dat
- %TEMP%\nsl2.tmp\config.lky
- %TEMP%\nsl2.tmp\ns3.tmp
- %TEMP%\nsl2.tmp\config.ini
- %TEMP%\nsl2.tmp\biSetup4478.exe
- %TEMP%\nsl2.tmp\bi.lza
- 'bi.##srv.com':80
- 'localhost':1036
- DNS ASK bi.##srv.com
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'