Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\4YMlwSAX] 'Name' = '"%TEMP%\ozVG9.tmp"'
- [<HKLM>\SYSTEM\ControlSet001\Services\cb19fa0] 'imagepath' = '%WINDIR%\TEMP\QtJfhoC1P.tmp'
- [<HKLM>\SYSTEM\ControlSet001\Services\cb19fa0] 'start' = '00000001'
- <SYSTEM32>\spoolsv.exe
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\wpad[1].dat
- %WINDIR%\Temp\QtJfhoC1P.tmp
- %TEMP%\ozVG9.tmp
- %WINDIR%\Temp\QtJfhoC1P.tmp
- из <Полный путь к вирусу> в %TEMP%\Gcb983T.tmp
- 'wpad.localdomain':80
- 'th###rims.com':80
- wpad.localdomain/wpad.dat
- th###rims.com/kx.php
- DNS ASK wpad.localdomain
- DNS ASK th###rims.com