db1234 databasepassword databasepass dbpassword dbpass domainpassword domainpass hello hell love money slut ** ** exchange loginpass login win2000 winnt winxp win2k win98 windows oeminstall accounting accounts letmein outlook mail qwerty temp123 temp null default changeme demo test 2005 2004 2001 secret payday deadline work 1234567890 123456789 12345678 1234567 123456 12345 1234 pass pass1234 passwd password password1 若成功,则拷贝病毒副本至对方目录,可能是:
C:\Documents and Settings\All Users\Documentsc:\windows\system32 c:\winnt\system32 c:\windows c:\winnt
7、利用系统漏洞传播(Lsass、RPC等漏洞),攻击的IP范围:
124.72.143.173(起始) - 随机。
被攻破的计算机可能被传播该病毒。
8、尝试以管理员身份连接其他服务器,可能是下列未授权的用户名:
staff teacher owner student intranet main office control siemens compaq dell cisco oracle data access database domain backup technical mary katie kate george eric none guest chris neil brian susan luke peter john mike bill fred wwwadmin oemuser user homeuser home internet root server linux unix computer admin admins administrat administrateur administrador administrator