Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\2826367456] 'Name' = '"%TEMP%\2.tmp"'
- <SYSTEM32>\spoolsv.exe
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1400' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1601' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] 'currentlevel' = '00000000'
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\wpad[1].dat
- %WINDIR%\Temp\4.tmp
- %TEMP%\1.tmp
- %WINDIR%\Temp\4.tmp
- <DRIVERS>\etc\hosts
- %TEMP%\2.tmp
- из <Полный путь к вирусу> в %TEMP%\3.tmp
- 'wpad.localdomain':80
- '18#.#29.88.8':80
- 18#.#29.88.8/lognn.php?lo###################################
- wpad.localdomain/wpad.dat
- 18#.#29.88.8/lognn.php?lo#######################################
- 18#.#29.88.8/lognn.php?lo#####################################
- 18#.#29.88.8/lognn.php?lo###############################################
- DNS ASK wpad.localdomain