Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{gvet11zg-2all-zm73-mci1-0uw61z0oih1d}] 'stubpath' = ''
- '%TEMP%\server.exe'
- '%TEMP%\~imsinst.exe' <Полный путь к вирусу>
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %TEMP%\DSC02881.JPG
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'GBDYLLO' WindowName: '(null)'
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: 'FilemonClass' WindowName: '(null)'
- ClassName: 'pediy06' WindowName: '(null)'
- %TEMP%\DSC02881.JPG
- <SYSTEM32>\inbfyviuk.exe
- <SYSTEM32>\inbfyviuk.exe_lang.ini
- %TEMP%\~imsinst.exe
- %TEMP%\~imsinst.tmp
- %TEMP%\server.exe
- %TEMP%\~imsinst.tmp
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '18467-41' WindowName: '(null)'