Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\IPRIP] 'Start' = '00000002'
- <SYSTEM32>\net1.exe start IPRIP
- <SYSTEM32>\sc.exe start iprip 'cmd' 1
- <SYSTEM32>\rundll32.exe NfIpv6.ocx,RundllInstallA IPRIP
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\45IVWXAN\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\U1ZUV0LW\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\G7MHKXSJ\Nfile[1].htm
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\0GLWBJJ4\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\G7MHKXSJ\desktop.ini
- <SYSTEM32>\NfIpv6.ocx
- %WINDIR%\NfIpv6.ocx
- %WINDIR%\YahooCache.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\45IVWXAN\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\0GLWBJJ4\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\G7MHKXSJ\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\U1ZUV0LW\desktop.ini
- из <Полный путь к вирусу> в %TEMP%\iexpl001.tmp
- 'www.th####pydoor.com':80
- www.th####pydoor.com/NfLog/Nfile.asp
- DNS ASK www.th####pydoor.com
- '<IP-адрес в локальной сети>':1036