Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\IPRIP] 'Start' = '00000002'
- <SYSTEM32>\net1.exe start IPRIP
- <SYSTEM32>\sc.exe start iprip 'cmd' 1
- <SYSTEM32>\rundll32.exe NfIpv6.ocx,RundllInstall IPRIP
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\KD2N89UZ\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\FREKC3FJ\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ODW9GBCP\Nfile[1].htm
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\0XUF0DQF\desktop.ini
- <SYSTEM32>\NfIpv6.ocx
- %WINDIR%\NfIpv6.ocx
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ODW9GBCP\desktop.ini
- %WINDIR%\YahooCache.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\KD2N89UZ\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\0XUF0DQF\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ODW9GBCP\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\FREKC3FJ\desktop.ini
- из <Полный путь к вирусу> в %TEMP%\iexpl001.tmp
- 'www.mi####oftupdata.com':80
- www.mi####oftupdata.com/NfLog/Nfile.asp
- DNS ASK www.mi####oftupdata.com