Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{tsugpuyi-bhgi-hosb-cubs-szavzyvycufc}] 'stubpath' = ''
- [<HKLM>\SYSTEM\ControlSet001\Services\oreans32] 'Start' = '00000001'
- '<SYSTEM32>\innqsrkjz.exe' ZhuDongdel<Полный путь к вирусу>
- ClassName: 'FilemonClass' WindowName: '(null)'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: '(null)'
- ClassName: 'RegmonClass' WindowName: '(null)'
- ClassName: 'OLLYDBG' WindowName: '(null)'
- ClassName: 'GBDYLLO' WindowName: '(null)'
- ClassName: 'pediy06' WindowName: '(null)'
- <SYSTEM32>\innqsrkjz.exe_lang.ini
- %TEMP%\171750_res.tmp
- <DRIVERS>\oreans32.sys
- <SYSTEM32>\innqsrkjz.exe
- %TEMP%\171750_res.tmp в %TEMP%\171812_lang.dll
- 'ba####ara.no-ip.org':4685
- DNS ASK ba####ara.no-ip.org
- ClassName: '(null)' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '18467-41' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '(null)' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'