Техническая информация
- %WINDIR%\Tasks\SA.DAT
- [<HKLM>\SYSTEM\ControlSet001\Services\VMwareService] 'Start' = '00000002'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%WINDIR%\system\VMwareService.exe' = '%WINDIR%\system\VMwareService.exe:*:Enabled:Microsoft Enabled'
- %WINDIR%\system\VMwareService.exe
- <SYSTEM32>\rundll32.exe <SYSTEM32>\sysdm.cpl,NoExecuteProcessException %WINDIR%\explorer.exe
- <SYSTEM32>\svchost.exe -k netsvcs
- <SYSTEM32>\dumprep.exe 1420 -dm 7 7 %TEMP%\WERe247.dir00\explorer.exe.mdmp 16325836412028056
- <SYSTEM32>\dumprep.exe 1420 -dm 7 7 %TEMP%\WERe247.dir00\explorer.exe.hdmp 16325836412028048
- %WINDIR%\Explorer.EXE
- ClassName: 'pediy06' WindowName: ''
- ClassName: 'GBDYLLO' WindowName: ''
- ClassName: 'OLLYDBG' WindowName: ''
- ClassName: 'MSNHiddenWindowClass' WindowName: ''
- %TEMP%\WERe247.dir00\manifest.txt
- %TEMP%\WERe247.dir00\appcompat.txt
- %WINDIR%\system\VMwareService.exe
- %WINDIR%\system\VMwareService.exe
- '1.##cbf.in':11830
- '<IP-адрес в локальной сети>':139
- '<IP-адрес в локальной сети>':445
- DNS ASK 1.##cbf.in
- ClassName: 'AIM_CSignOnWnd' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''