Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%APPDATA%\Microsoft\svchost.exe'
- %HOMEPATH%\Start Menu\Programs\Startup\jGLQLNCwQJJZUJ4EdPJeUHPhrMNNv.exe
- <Имя диска съемного носителя>:\Microsoft.exe
- '%APPDATA%\Microsoft\svchost.exe'
- [<HKCU>\Software\Paltalk]
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'GBDYLLO' WindowName: ''
- ClassName: 'pediy06' WindowName: ''
- %TEMP%\melt.Tmp
- %APPDATA%\Microsoft\svchost.exe
- <Имя диска съемного носителя>:\Microsoft.exe
- <Полный путь к вирусу>
- %APPDATA%\Microsoft\svchost.exe
- 'sk######amorada.no-ip.biz':2000
- DNS ASK sk######amorada.no-ip.biz
- ClassName: '18467-41' WindowName: ''
- ClassName: 'Shell_traywnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'