Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\6to4] 'Start' = '00000002'
- <SYSTEM32>\svchost.exe -k NetSVCS
- %TEMP%\ms1906.tmp
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\bluehills[1].jpg
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\IVQDA70J\wpad[1].dat
- <Текущая директория>\<Имя вируса>.doc
- %TEMP%\1c733.exe
- %TEMP%\7.tmp
- %TEMP%\1c733.exe
- из <Полный путь к вирусу> в %TEMP%\1.tmp
- 'wpad.localdomain':80
- 'in#######ce.windowssysinfo.com':443
- 'i7##.##otobucket.com':80
- wpad.localdomain/wpad.dat
- i7##.##otobucket.com/albums/xx203/soniwii/bluehills.jpg
- DNS ASK wpad.localdomain
- DNS ASK in#######ce.windowssysinfo.com
- DNS ASK i7##.##otobucket.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'WordPadClass' WindowName: ''