Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\sdk] 'Name' = '"%TEMP%\2.tmp"'
- <SYSTEM32>\spoolsv.exe
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ITN7NXU3\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ENA5G78T\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\6GWC1HKD\wpad[1].dat
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\FPEEGP0P\desktop.ini
- %WINDIR%\Temp\3.tmp
- %TEMP%\1.tmp
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\6GWC1HKD\desktop.ini
- <SYSTEM32>\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\wpad[1].dat
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ITN7NXU3\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\FPEEGP0P\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\6GWC1HKD\desktop.ini
- C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ENA5G78T\desktop.ini
- %WINDIR%\Temp\3.tmp
- %TEMP%\2.tmp
- из <Полный путь к вирусу> в %TEMP%\4.tmp
- 'wpad.localdomain':80
- 'up#####ackupserver.com':80
- up#####ackupserver.com/version/xtasks.php?2_##################################################################################################
- wpad.localdomain/wpad.dat
- up#####ackupserver.com/version/xtasks.php?1_########################################################################################################
- DNS ASK wpad.localdomain
- DNS ASK up#####ackupserver.com