Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\IPRIP] 'Start' = '00000002'
- <SYSTEM32>\net1.exe start IPRIP
- <SYSTEM32>\sc.exe start iprip 'cmd' 1
- <SYSTEM32>\rundll32.exe NfIpv6.ocx,RundllInstall IPRIP
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\SX6PG5EB\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8RMN0YE0\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\C5QVOHAJ\Nfile[1].htm
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\DCDC1OF4\desktop.ini
- <SYSTEM32>\NfIpv6.ocx
- %WINDIR%\NfIpv6.ocx
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\C5QVOHAJ\desktop.ini
- %WINDIR%\YahooCache.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\SX6PG5EB\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\DCDC1OF4\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\C5QVOHAJ\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\8RMN0YE0\desktop.ini
- из <Полный путь к вирусу> в %TEMP%\iexpl001.tmp
- 'www.su###quail.com':80
- www.su###quail.com/NfLog/Nfile.asp
- DNS ASK www.su###quail.com