Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%APPDATA%\Adobe\Services\phiwxhuh.exe'
- '<SYSTEM32>\cmd.exe' /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "%APPDATA%\Adobe\Services\phiwxhuh.exe" /f
- '<SYSTEM32>\reg.exe' add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "%APPDATA%\Adobe\Services\phiwxhuh.exe" /f
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\csc.exe' /noconfig /fullpaths @"%TEMP%\1qd3jx4z.cmdline"
- '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES2.tmp" "%APPDATA%\Adobe\Services\CSC1.tmp"
- '%APPDATA%\Adobe\Services\phiwxhuh.exe' <Полный путь к вирусу>
- %WINDIR%\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
- %APPDATA%\Adobe\Services\phiwxhuh.exe
- %TEMP%\RES2.tmp
- %APPDATA%\CrashLogs\07-21-2016
- %APPDATA%\Adobe\Services\ur3nwfbp.exe
- %TEMP%\1qd3jx4z.cmdline
- %TEMP%\1qd3jx4z.0.cs
- %APPDATA%\Adobe\Services\CSC1.tmp
- %TEMP%\1qd3jx4z.out
- %TEMP%\1qd3jx4z.out
- %TEMP%\1qd3jx4z.0.cs
- %TEMP%\1qd3jx4z.cmdline
- %TEMP%\RES2.tmp
- %APPDATA%\Adobe\Services\CSC1.tmp
- 'se####.mailserver02.xyz':905
- '20#.#6.232.182':80
- DNS ASK se####.mailserver02.xyz
- DNS ASK up####.microsoft.com
- ClassName: 'Shell_TrayWnd' WindowName: ''