Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{64F2D26F-46F9-4651-B2B9-C1B450F00736}] 'stubpath' = ''
- '%TEMP%\server.exe'
- '<SYSTEM32>\inxjymong.exe'
- '%TEMP%\~imsinst.exe' <Полный путь к вирусу>
- '%TEMP%\ѕЖАМЗЗєё±в(їЬєО,і»єО).exe'
- '<SYSTEM32>\userinit.exe'
- <SYSTEM32>\userinit.exe
- ClassName: 'FilemonClass' WindowName: '(null)'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
- ClassName: 'RegmonClass' WindowName: '(null)'
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: 'GBDYLLO' WindowName: '(null)'
- ClassName: 'pediy06' WindowName: '(null)'
- <SYSTEM32>\inxjymong.exe
- <SYSTEM32>\inxjymong.exe_lang.ini
- %TEMP%\195437_res.tmp
- %TEMP%\server.exe
- %TEMP%\~imsinst.exe
- %TEMP%\~imsinst.tmp
- %TEMP%\ѕЖАМЗЗєё±в(їЬєО,і»єО).exe
- %TEMP%\~imsinst.tmp
- %TEMP%\195437_res.tmp в %TEMP%\195500_lang.dll
- 'sk####47.codns.com':2554
- DNS ASK sk####47.codns.com
- ClassName: '18467-41' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'