Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\FghiPlmnopqr Tyuv] 'Start' = '00000002'
- '<SYSTEM32>\wscript.exe' "C:\7500.vbs"
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'GBDYLLO' WindowName: ''
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: 'pediy06' WindowName: ''
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\123456789[1]
- C:\7500.vbs
- C:\7500.vbs
- из <Полный путь к вирусу> в <SYSTEM32>\BRemotes.exe
- 'us##.#zone.qq.com':80
- 'localhost':1039
- '12#.#01.24.62':5775
- http://us##.#zone.qq.com/123456789
- DNS ASK us##.#zone.qq.com
- ClassName: '18467-41' WindowName: ''