Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%WINDIR%\System\svchost.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%WINDIR%\System\svchost.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%WINDIR%\System\svchost.exe'
- %WINDIR%\system\svchost.exe Kill(<Полный путь к вирусу>)
- <SYSTEM32>\rundll32.exe <SYSTEM32>\sysdm.cpl,NoExecuteProcessException %WINDIR%\system\svchost.exe
- <SYSTEM32>\dumprep.exe 2824 -dm 7 7 "%TEMP%\WER20b1.dir00\svchost.exe.hdmp" 16325836412027144
- <SYSTEM32>\dumprep.exe 2824 -dm 7 7 "%TEMP%\WER20b1.dir00\svchost.exe.mdmp" 16325836412027124
- %TEMP%\WER20b1.dir00\svchost.exe.hdmp
- %TEMP%\WER20b1.dir00\appcompat.txt
- %TEMP%\WER20b1.dir00\manifest.txt
- %WINDIR%\system\svchost.exe
- %WINDIR%\system\RCX1.tmp
- %TEMP%\WER20b1.dir00\svchost.exe.mdmp
- %WINDIR%\system\svchost.exe
- %WINDIR%\system\svchost.exe
- 'he####gj.no-ip.info':3178
- DNS ASK he####gj.no-ip.info
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'BHH'