Техническая информация
- <SYSTEM32>\ping.exe 192.192.192.192 -n 1 -w 5000
- <SYSTEM32>\cmd.exe /C """%TEMP%\vii1.cmd"" "<Полный путь к вирусу>""
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE http://www.mo####sviews.com/1.php?1=##################################################################################
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\1[1].php
- %TEMP%\vii2.tmp
- %TEMP%\vii1.cmd
- %TEMP%\vii1.cmd
- 'www.mo####sviews.com':80
- 'localhost':1036
- www.mo####sviews.com/1.php?1=##################################################################################
- DNS ASK www.mo####sviews.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: 'SysAnalyzer'
- ClassName: '' WindowName: ''