Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'indice' = '<Полный путь к вирусу>'
- ClassName: 'FilemonClass' WindowName: '(null)'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
- ClassName: 'RegmonClass' WindowName: '(null)'
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: 'GBDYLLO' WindowName: '(null)'
- ClassName: 'pediy06' WindowName: '(null)'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\nvreserv[1].inf
- <LS_APPDATA>\system3.txt
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\fanton[1].inf
- 'ja####adourado.com':80
- 'localhost':3306
- 'localhost':1035
- 'jo####atavares.com':80
- ja####adourado.com/nvrserv/nvreserv.inf
- jo####atavares.com/nvrserv/fanton.inf
- DNS ASK ja####adourado.com
- DNS ASK jo####atavares.com
- ClassName: '18467-41' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'