Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'UserFaultCheck' = ''
- <SYSTEM32>\spoolsv.exe файлом <SYSTEM32>\spoolsv.exe
- 'C:\1.EXE'
- 'C:\1.EXE' (загружен из сети Интернет)
- '<SYSTEM32>\net1.exe' stop server /y
- '<SYSTEM32>\net.exe' stop server /y
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\spoolsv.exe
- AVP.EXE
- NAVAPW32.EXE
- AVPM.EXE
- AVP32.EXE
- AVPCC.EXE
- %WINDIR%\pchealth\ERRORREP\UserDumps\winlogon.exe.20130628-013956-00.hdmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\binn[1].exe
- C:\1.EXE
- <SYSTEM32>\Death.SiShen
- C:\pass.dic
- %WINDIR%\pchealth\ERRORREP\UserDumps\winlogon.exe.20130628-013956-00.mdmp
- C:\pass.dic
- <SYSTEM32>\spoolsv.exe
- 'www.36##c.com':80
- 'localhost':1036
- www.36##c.com/binn.exe
- DNS ASK www.36##c.com
- ClassName: '(null)' WindowName: 'Wrapped gift Killer'
- ClassName: '(null)' WindowName: 'Duba'
- ClassName: '(null)' WindowName: 'Symantec AntiVirus'
- ClassName: '(null)' WindowName: 'IceSword'
- ClassName: 'TForm1' WindowName: '(null)'
- ClassName: '(null)' WindowName: '??????'
- ClassName: '(null)' WindowName: 'pjf(ustc)'
- ClassName: 'RavMonClass' WindowName: 'RavMon.exe'
- ClassName: '(null)' WindowName: '???????????? KV2006??????????'
- ClassName: '(null)' WindowName: 'Symantec AntiVirus ??????'
- ClassName: 'TfLockDownMain' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'VirusScan'
- ClassName: 'Tapplication' WindowName: '????????????????'
- ClassName: 'ZAFrameWnd' WindowName: 'ZoneAlarm'