Technical Information
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] '<Virus name>' = '<Full path to virus>'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '<Virus name>' = '<Full path to virus>'
- <Auxiliary element>
- %CommonProgramFiles%\<Auxiliary name>\Drivers\Virtual Printer\TPOG3\i386\OutputThinPrint.exe
- %CommonProgramFiles%\<Auxiliary name>\Drivers\Virtual Printer\TPOG3\i386\RCX3.tmp
- %CommonProgramFiles%\Microsoft Shared\DW\1033\RCX1.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\windowsupdate.microsoft[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\getfile[1].php
- %CommonProgramFiles%\Microsoft Shared\DW\1033\DWIntl20Application.exe
- <Auxiliary element>
- %CommonProgramFiles%\Microsoft Shared\DW\1033\DWIntl20Application.exe
- 'co####rslocal.com':80
- '20#.#6.232.182':80
- co####rslocal.com/getfile.php?r=#################################################################################################
- 20#.#6.232.182/
- DNS ASK co####rslocal.com
- DNS ASK windowsupdate.microsoft.com