Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\syshost32] 'Start' = '00000002'
- '%WINDIR%\Installer\{1DC9BF70-E87D-037C-57E6-36777E160EFB}\syshost.exe' /service
- '<SYSTEM32>\dumprep.exe' 1652 -dm 7 7 %TEMP%\WER15cc.dir00\ctfmon.exe.mdmp 16325836412027240
- '<SYSTEM32>\dumprep.exe' 1412 -dm 7 7 %TEMP%\WERf1cd.dir00\explorer.exe.mdmp 16325836412028020
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\spoolsv.exe
- <SYSTEM32>\alg.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\smss.exe
- System
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\services.exe
- <SYSTEM32>\winlogon.exe
- C:\spoolerlogs\spooler.xml
- %WINDIR%\Installer\{1DC9BF70-E87D-037C-57E6-36777E160EFB}\syshost.exe
- из <Полный путь к вирусу> в %TEMP%\8b7f8f8.tmp
- ClassName: '(null)' WindowName: 'SdwBtgvyha'
- ClassName: '(null)' WindowName: 'lLlaUX'
- ClassName: '(null)' WindowName: 'zhzSLf'
- ClassName: '(null)' WindowName: 'O rb gp'
- ClassName: '(null)' WindowName: 'WDh eq p '
- ClassName: '(null)' WindowName: 'p Owd nh'
- ClassName: '(null)' WindowName: 'ngtzlVBo'
- ClassName: '(null)' WindowName: 'qd'
- ClassName: '(null)' WindowName: 'tewTYjNmtG'
- ClassName: '(null)' WindowName: 'qxTpkVqr'