Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'UserFaultCheck' = ''
- [<HKLM>\SYSTEM\ControlSet001\Services\syshost32] 'Start' = '00000002'
- '%WINDIR%\Installer\{DA7C27E0-AA78-E66E-B978-65F770B0CE6B}\syshost.exe' /service
- '<SYSTEM32>\dumprep.exe' 1660 -dm 7 7 %TEMP%\WER964c.dir00\ctfmon.exe.mdmp 16325836412027240
- '<SYSTEM32>\dumprep.exe' 1420 -dm 7 7 %TEMP%\WER8630.dir00\explorer.exe.mdmp 16325836412028028
- '<SYSTEM32>\cmd.exe' /C del /Q /F "%TEMP%\63559225.tmp"
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\spoolsv.exe
- <SYSTEM32>\alg.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\smss.exe
- System
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\services.exe
- <SYSTEM32>\winlogon.exe
- %WINDIR%\pchealth\ERRORREP\UserDumps\csrss.exe.20151017-062712-00.mdmp
- C:\spoolerlogs\spooler.xml
- %WINDIR%\Installer\{DA7C27E0-AA78-E66E-B978-65F770B0CE6B}\syshost.exe
- из <Полный путь к вирусу> в %TEMP%\63559225.tmp