Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'ATI32' = '<SYSTEM32>\svchosrt64.exe'
- <SYSTEM32>\cscript.exe "<SYSTEM32>\tsmadescript.vbs"
- <SYSTEM32>\regsvr32.exe <SYSTEM32>\svchosrtt.dll /s
- <SYSTEM32>\regsvr32.exe <SYSTEM32>\gdlldirectx64.ocx /s
- <SYSTEM32>\gdlldirectx64.ocx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\Capitao[1].dll
- <SYSTEM32>\svchosrtt.dll
- <SYSTEM32>\tsmadescript.vbs
- <SYSTEM32>\SrUac64.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Rem[1].ocx
- <Полный путь к вирусу>
- 'www.jo######amargarida.com.br':80
- 'localhost':1036
- www.jo######amargarida.com.br/Capitao.dll
- www.jo######amargarida.com.br/Rem.ocx
- DNS ASK www.jo######amargarida.com.br
- '<IP-адрес в локальной сети>':1037
- ClassName: '' WindowName: 'GEFORCE . 512 OPENGL IVY BRIGD'