Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\6to4] 'Start' = '00000002'
- <SYSTEM32>\svchost.exe -k NetSVCS
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\IVQDA70J\wpad[1].dat
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\IVQDA70J\bluehills[1].jpg
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\bluehills[1].jpg
- %TEMP%\1ae9a.exe
- %TEMP%\2.tmp
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\bluehills[1].jpg
- %TEMP%\1ae9a.exe
- из <Полный путь к вирусу> в %TEMP%\1.tmp
- 'wpad.localdomain':80
- 'in#######ce.windowssysinfo.com':443
- 'i7##.##otobucket.com':80
- wpad.localdomain/wpad.dat
- i7##.##otobucket.com/albums/xx203/soniwii/bluehills.jpg
- DNS ASK wpad.localdomain
- DNS ASK in#######ce.windowssysinfo.com
- DNS ASK i7##.##otobucket.com