Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%WINDIR%\services.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'services' = '%WINDIR%\services.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'services' = '%WINDIR%\services.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%WINDIR%\services.exe' = '%WINDIR%\services.exe:*:Enabled:services'
- %WINDIR%\services.exe <Полный путь к вирусу>
- <SYSTEM32>\dumprep.exe 2784 -dm 7 7 "%TEMP%\WER3b96.dir00\services.exe.hdmp" 16325836412027388
- <SYSTEM32>\rundll32.exe <SYSTEM32>\sysdm.cpl,NoExecuteProcessException %WINDIR%\services.exe
- <SYSTEM32>\netsh.exe firewall add allowedprogram "%WINDIR%\services.exe" services Enable
- <SYSTEM32>\dumprep.exe 2784 -dm 7 7 "%TEMP%\WER3b96.dir00\services.exe.mdmp" 16325836412027376
- %TEMP%\WER3b96.dir00\services.exe.hdmp
- %TEMP%\WER3b96.dir00\appcompat.txt
- %TEMP%\WER3b96.dir00\manifest.txt
- %WINDIR%\services.exe
- %WINDIR%\RCX1.tmp
- %TEMP%\WER3b96.dir00\services.exe.mdmp
- %WINDIR%\services.exe
- %WINDIR%\services.exe
- DNS ASK fl####.jessicadube.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: '' WindowName: 'H1N1'