Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\IPRIP] 'Start' = '00000002'
- <SYSTEM32>\net1.exe start IPRIP
- <SYSTEM32>\sc.exe start iprip 'cmd' 1
- <SYSTEM32>\rundll32.exe %WINDIR%\temp\NfIpv6.ocx,RundllInstallA IPRIP
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\CXANO1IF\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\89ABCDEF\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RDH94TX1\Nfile[1].htm
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\HKMIENAR\desktop.ini
- %WINDIR%\Temp\YahooCache.ini
- %WINDIR%\Temp\NfIpv6.ocx
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RDH94TX1\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\CXANO1IF\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\HKMIENAR\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\RDH94TX1\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\89ABCDEF\desktop.ini
- из <Полный путь к вирусу> в %TEMP%\iexpl001.tmp
- 'www.jp##fa.com':80
- www.jp##fa.com/NfLog/Nfile.asp
- DNS ASK www.jp##fa.com