Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'mmva' = '<SYSTEM32>\mmvo.exe'
- <SYSTEM32>\dllcache\tdi.sys with <SYSTEM32>\dllcache\tdi.sys.new
- <DRIVERS>\tdi.sys with <DRIVERS>\tdi.sys.new
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\uvg.com
- hidden files
- %WINDIR%\rb.exe
- %WINDIR%\Explorer.EXE
- Handler for all processes: <SYSTEM32>\mmvo0.dll
- ClassName: 'AVP.Product_Notification' WindowName: ''
- ClassName: 'AVP.AlertDialog' WindowName: ''
- C:\autorun.inf
- C:\uvg.com
- %TEMP%\uu.rar
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\uu[1].rar
- <SYSTEM32>\dllcache\tdi.sys.new
- <SYSTEM32>\mmvo.exe
- %WINDIR%\rb.exe
- <DRIVERS>\tdi.sys.new
- <SYSTEM32>\mmvo0.dll
- C:\autorun.inf
- <Drive name for removable media>:\uvg.com
- <Drive name for removable media>:\autorun.inf
- <SYSTEM32>\mmvo.exe
- <SYSTEM32>\mmvo0.dll
- C:\uvg.com
- C:\autorun.inf
- <Drive name for removable media>:\uvg.com
- <Drive name for removable media>:\autorun.inf
- C:\uvg.com
- <DRIVERS>\tdi.sys
- %WINDIR%\rb.exe
- %TEMP%\uu.rar
- from <Full path to virus> to %TEMP%\tru1.tmp
- 'www.er##32.com':80
- 'localhost':1035
- www.er##32.com/rbv/uu.rar
- DNS ASK www.er##32.com
- ClassName: 'Indicator' WindowName: ''