Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{29E3A061-26E1-47c5-BF06-A59C2638EDC0}] 'stubpath' = ''
- '<SYSTEM32>\inzvgovkd.exe'
- '%TEMP%\BurgerEngine.exe'
- '%TEMP%\~imsinst.exe' <Полный путь к вирусу>
- '%TEMP%\server.exe'
- '<SYSTEM32>\userinit.exe'
- <SYSTEM32>\userinit.exe
- ClassName: 'FilemonClass' WindowName: '(null)'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
- ClassName: 'RegmonClass' WindowName: '(null)'
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: 'GBDYLLO' WindowName: '(null)'
- ClassName: 'pediy06' WindowName: '(null)'
- <SYSTEM32>\inzvgovkd.exe
- <SYSTEM32>\inzvgovkd.exe_lang.ini
- %TEMP%\224593_res.tmp
- %TEMP%\BurgerEngine.exe
- %TEMP%\~imsinst.exe
- %TEMP%\~imsinst.tmp
- %TEMP%\server.exe
- %TEMP%\~imsinst.tmp
- %TEMP%\224593_res.tmp в %TEMP%\224640_lang.dll
- '12#.#83.5.30':80
- ClassName: '18467-41' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'