Техническая информация
- '%TEMP%\nsx2.tmp\nsissetup.exe' -- <Имя вируса>.exe
- '%TEMP%\nsx2.tmp\ns3.tmp' cmd /c wmic process call create "%TEMP%\nsx2.tmp\nsissetup.exe -- <Имя вируса>.exe","<Текущая директория>"
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- '<SYSTEM32>\wbem\wmic.exe' process call create "%TEMP%\nsx2.tmp\nsissetup.exe -- <Имя вируса>.exe","<Текущая директория>"
- <SYSTEM32>\wbem\AutoRecover\23BDE61F1F4FACE17E9B0C01F2A1FD9B.mof
- <Текущая директория>\TempWmicBatchFile.bat
- <SYSTEM32>\wbem\AutoRecover\C8463ECBE33BC240263A0B094E46D510.mof
- %TEMP%\tmp6.tmp
- %TEMP%\DLG7.tmp
- %TEMP%\DLG\initWindow\progress.html
- %TEMP%\DLG\loadingImage\loadingImage.bmp
- %TEMP%\DLG\initWindow\css\style.css
- %TEMP%\DLG\initWindow\noconnection.html
- %TEMP%\tmp5.tmp
- %TEMP%\nsx2.tmp\nsissetup.7z
- %TEMP%\nsx2.tmp\nsP7ZIP.dll
- %TEMP%\nsx2.tmp\nsissetup.7z.crypt
- %TEMP%\nsx2.tmp\DcryptDll.dll
- %TEMP%\nsx2.tmp\nsissetup.exe
- %TEMP%\nsx2.tmp\ns3.tmp
- %TEMP%\tmp4.tmp
- %TEMP%\nsx2.tmp\System.dll
- %TEMP%\nsx2.tmp\nsExec.dll
- %TEMP%\tmp6.tmp
- %TEMP%\tmp5.tmp
- %TEMP%\tmp4.tmp
- 'dl#####figs.buzzrin.de':80
- 'localhost':1036
- DNS ASK dl#####figs.buzzrin.de
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '#32770' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''