Техническая информация
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = '"%WINDIR%\tracing\winlogon.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'services' = '"C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\services.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'System' = '"C:\totalcmd\LANGUAGE\System.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'mdm' = '"C:\Far2\Encyclopedia\tap\mdm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'iexplore' = '"<Текущая директория>\iexplore.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'iexplore' = '"%ProgramFiles(x86)%\QIP 2012\Skins\QIP\XStatuses\iexplore.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsm' = '"%ProgramFiles%\Updater\lsm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'iexplore' = '"%ProgramFiles%\spider\iexplore.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsass' = '"%WINDIR%\SchCache\lsass.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'explorer' = '"C:\Users\Default User\explorer.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'System' = '"C:\Far2\Encyclopedia\tap\System.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'WUDFHost' = '"%ALLUSERSPROFILE%\Package Cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\WUDFHost.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'explorer' = '"%ALLUSERSPROFILE%\Adobe\explorer.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsm' = '"%WINDIR%\Microsoft.NET\authman\lsm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'csrss' = '"C:\totalcmd\LANGUAGE\csrss.exe"'
- [<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, "%WINDIR%\tracing\winlogon.exe", "%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe", "%ProgramFiles%\PM\c...
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'csrss' = '"%ProgramFiles%\PM\csrss.exe"'
- [<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, "%WINDIR%\tracing\winlogon.exe", "%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'services' = '"%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe"'
- [<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, "%WINDIR%\tracing\winlogon.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'csrss' = '"C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\csrss.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsass' = '"%HOMEPATH%\Application Data\lsass.exe"'
- <SYSTEM32>\tasks\winlogon
- <SYSTEM32>\tasks\iexplorei
- <SYSTEM32>\tasks\iexplore
- <SYSTEM32>\tasks\lsassl
- <SYSTEM32>\tasks\lsass
- <SYSTEM32>\tasks\wudfhostw
- <SYSTEM32>\tasks\system
- <SYSTEM32>\tasks\systems
- <SYSTEM32>\tasks\wudfhost
- <SYSTEM32>\tasks\explorere
- <SYSTEM32>\tasks\explorer
- <SYSTEM32>\tasks\lsml
- <SYSTEM32>\tasks\lsm
- <SYSTEM32>\tasks\csrssc
- <SYSTEM32>\tasks\csrss
- <SYSTEM32>\tasks\servicess
- <SYSTEM32>\tasks\services
- <SYSTEM32>\tasks\winlogonw
- <SYSTEM32>\tasks\mdm
- <SYSTEM32>\tasks\mdmm
- Средство контроля пользовательских учетных записей (UAC)
- %WINDIR%\tracing\winlogon.exe
- %ProgramFiles%\updater\lsm.exe
- %ProgramFiles%\updater\101b941d020240
- %ProgramFiles(x86)%\qip 2012\skins\qip\xstatuses\iexplore.exe
- %ProgramFiles(x86)%\qip 2012\skins\qip\xstatuses\9db6e019d4f04e
- <Текущая директория>\iexplore.exe
- <Текущая директория>\9db6e019d4f04e
- %WINDIR%\microsoft.net\authman\101b941d020240
- C:\far2\encyclopedia\tap\mdm.exe
- C:\totalcmd\language\system.exe
- C:\totalcmd\language\27d1bcfc3c54e0
- C:\msocache\all users\{90140000-0011-0000-1000-0000000ff1ce}-c\services.exe
- C:\msocache\all users\{90140000-0011-0000-1000-0000000ff1ce}-c\c5b4cb5e9653cc
- C:\msocache\all users\{90140000-0044-0409-1000-0000000ff1ce}-c\csrss.exe
- C:\msocache\all users\{90140000-0044-0409-1000-0000000ff1ce}-c\886983d96e3d3e
- %ProgramFiles%\spider\iexplore.exe
- %ProgramFiles%\spider\9db6e019d4f04e
- %WINDIR%\schcache\6203df4a6bafc7
- %WINDIR%\schcache\lsass.exe
- C:\users\default user\7a0fd90576e088
- %ALLUSERSPROFILE%\microsoft toolkit\services.exe
- %ALLUSERSPROFILE%\microsoft toolkit\c5b4cb5e9653cc
- %ProgramFiles%\pm\csrss.exe
- %ProgramFiles%\pm\886983d96e3d3e
- C:\totalcmd\language\csrss.exe
- C:\totalcmd\language\886983d96e3d3e
- %HOMEPATH%\application data\lsass.exe
- C:\far2\encyclopedia\tap\559fba5f8e4410
- %WINDIR%\microsoft.net\authman\lsm.exe
- %ALLUSERSPROFILE%\adobe\7a0fd90576e088
- %ALLUSERSPROFILE%\package cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\wudfhost.exe
- %ALLUSERSPROFILE%\package cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\480b7989c529f6
- C:\far2\encyclopedia\tap\system.exe
- C:\far2\encyclopedia\tap\27d1bcfc3c54e0
- C:\users\default user\explorer.exe
- %WINDIR%\tracing\cc11b995f2a76d
- %ALLUSERSPROFILE%\adobe\explorer.exe
- %HOMEPATH%\application data\6203df4a6bafc7
- '18#.#20.247.159':80
- http://18#.#20.247.159/JavascriptcpuTemp.php?ca##################################################################################################################################################...
- http://18#.#20.247.159/JavascriptcpuTemp.php?eh##################################################################################################################################################...
- '<Текущая директория>\iexplore.exe'
- '<Текущая директория>\iexplore.exe' ' (со скрытым окном)
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc MINUTE /mo 14 /tr "'%WINDIR%\tracing\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplorei" /sc MINUTE /mo 6 /tr "'<Текущая директория>\iexplore.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONSTART /tr "'<Текущая директория>\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONLOGON /tr "'<Текущая директория>\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc MINUTE /mo 7 /tr "'<Текущая директория>\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplorei" /sc MINUTE /mo 12 /tr "'%ProgramFiles(x86)%\QIP 2012\Skins\QIP\XStatuses\iexplore.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONSTART /tr "'%ProgramFiles(x86)%\QIP 2012\Skins\QIP\XStatuses\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONLOGON /tr "'%ProgramFiles(x86)%\QIP 2012\Skins\QIP\XStatuses\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc MINUTE /mo 12 /tr "'%ProgramFiles(x86)%\QIP 2012\Skins\QIP\XStatuses\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsml" /sc MINUTE /mo 8 /tr "'%ProgramFiles%\Updater\lsm.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONSTART /tr "'%ProgramFiles%\Updater\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONLOGON /tr "'%ProgramFiles%\Updater\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc MINUTE /mo 12 /tr "'%ProgramFiles%\Updater\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplorei" /sc MINUTE /mo 7 /tr "'%ProgramFiles%\spider\iexplore.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONSTART /tr "'%ProgramFiles%\spider\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONLOGON /tr "'%ProgramFiles%\spider\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'%WINDIR%\SchCache\lsass.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc MINUTE /mo 5 /tr "'%ProgramFiles%\spider\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "mdm" /sc MINUTE /mo 9 /tr "'C:\Far2\Encyclopedia\tap\mdm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "mdm" /sc ONLOGON /tr "'C:\Far2\Encyclopedia\tap\mdm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONLOGON /tr "'%HOMEPATH%\Application Data\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc MINUTE /mo 14 /tr "'%HOMEPATH%\Application Data\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\csrss.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\services.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHostW" /sc MINUTE /mo 7 /tr "'%ALLUSERSPROFILE%\Package Cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\WUDFHost.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\totalcmd\LANGUAGE\System.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONSTART /tr "'C:\totalcmd\LANGUAGE\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONLOGON /tr "'C:\totalcmd\LANGUAGE\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc MINUTE /mo 10 /tr "'C:\totalcmd\LANGUAGE\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "mdmm" /sc MINUTE /mo 9 /tr "'C:\Far2\Encyclopedia\tap\mdm.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "mdm" /sc ONSTART /tr "'C:\Far2\Encyclopedia\tap\mdm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONSTART /tr "'%WINDIR%\SchCache\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONLOGON /tr "'%WINDIR%\SchCache\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc MINUTE /mo 14 /tr "'%WINDIR%\SchCache\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONSTART /tr "'C:\totalcmd\LANGUAGE\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONLOGON /tr "'C:\totalcmd\LANGUAGE\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc MINUTE /mo 11 /tr "'C:\totalcmd\LANGUAGE\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'%ProgramFiles%\PM\csrss.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONSTART /tr "'%ProgramFiles%\PM\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONLOGON /tr "'%ProgramFiles%\PM\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc MINUTE /mo 9 /tr "'%ProgramFiles%\PM\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "servicess" /sc MINUTE /mo 13 /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc MINUTE /mo 9 /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'%WINDIR%\tracing\winlogon.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc ONSTART /tr "'%WINDIR%\tracing\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc ONLOGON /tr "'%WINDIR%\tracing\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc MINUTE /mo 5 /tr "'%WINDIR%\Microsoft.NET\authman\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONLOGON /tr "'%WINDIR%\Microsoft.NET\authman\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\totalcmd\LANGUAGE\csrss.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONSTART /tr "'%WINDIR%\Microsoft.NET\authman\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\explorer.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsml" /sc MINUTE /mo 5 /tr "'%WINDIR%\Microsoft.NET\authman\lsm.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc ONSTART /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Far2\Encyclopedia\tap\System.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONSTART /tr "'C:\Far2\Encyclopedia\tap\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONLOGON /tr "'C:\Far2\Encyclopedia\tap\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONSTART /tr "'%HOMEPATH%\Application Data\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Package Cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Package Cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc MINUTE /mo 12 /tr "'%ALLUSERSPROFILE%\Package Cache\{615bc16d-60f5-482e-91b3-b51d8130963b}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorere" /sc MINUTE /mo 10 /tr "'%ALLUSERSPROFILE%\Adobe\explorer.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Adobe\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Adobe\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "explorer" /sc MINUTE /mo 10 /tr "'%ALLUSERSPROFILE%\Adobe\explorer.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc MINUTE /mo 14 /tr "'C:\Far2\Encyclopedia\tap\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'%HOMEPATH%\Application Data\lsass.exe'" /f