Technical Information
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'spoolsv' = '"%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'iexplore' = '"C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'System' = '"%ProgramFiles%\vsmon\System.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'Idle' = '"C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Idle.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'taskhost' = '"C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = '"%WINDIR%\PCHEALTH\ERRORREP\QSIGNOFF\winlogon.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsm' = '"C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'csrss' = '"<Current directory>\csrss.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'smss' = '"%ALLUSERSPROFILE%\Microsoft\DRM\Server\smss.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'taskhost' = '"%WINDIR%\addins\taskhost.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'Idle' = '"%ALLUSERSPROFILE%\Templates\Idle.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'dwm' = '"%ProgramFiles%\VirusNews\dwm.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'lsass' = '"%ALLUSERSPROFILE%\Microsoft Toolkit\lsass.exe"'
- [<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, "%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe", "C:\Far2\Plugins\DrawLine\spoolsv.exe"...
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'spoolsv' = '"C:\Far2\Plugins\DrawLine\spoolsv.exe"'
- [<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe, "%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'WUDFHost' = '"%ProgramFiles(x86)%\Mozilla Thunderbird\uninstall\WUDFHost.exe"'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] 'WUDFHost' = '"%ALLUSERSPROFILE%\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\WUDFHost.exe"'
- <SYSTEM32>\tasks\spoolsv
- <SYSTEM32>\tasks\wudfhost
- <SYSTEM32>\tasks\systems
- <SYSTEM32>\tasks\iexplore
- <SYSTEM32>\tasks\system
- <SYSTEM32>\tasks\winlogonw
- <SYSTEM32>\tasks\lsml
- <SYSTEM32>\tasks\winlogon
- <SYSTEM32>\tasks\csrssc
- <SYSTEM32>\tasks\lsm
- <SYSTEM32>\tasks\smsss
- <SYSTEM32>\tasks\csrss
- <SYSTEM32>\tasks\smss
- <SYSTEM32>\tasks\taskhostt
- <SYSTEM32>\tasks\taskhost
- <SYSTEM32>\tasks\idlei
- <SYSTEM32>\tasks\idle
- <SYSTEM32>\tasks\dwmd
- <SYSTEM32>\tasks\dwm
- <SYSTEM32>\tasks\lsassl
- <SYSTEM32>\tasks\lsass
- <SYSTEM32>\tasks\spoolsvs
- <SYSTEM32>\tasks\wudfhostw
- <SYSTEM32>\tasks\iexplorei
- %ProgramFiles(x86)%\opera\29.0.1795.47\localization\spoolsv.exe
- %ProgramFiles(x86)%\mozilla thunderbird\uninstall\480b7989c529f6
- %ProgramFiles(x86)%\mozilla thunderbird\uninstall\wudfhost.exe
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\9db6e019d4f04e
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe
- %ProgramFiles%\vsmon\27d1bcfc3c54e0
- %ProgramFiles%\vsmon\system.exe
- C:\msocache\all users\{90140000-0044-0409-1000-0000000ff1ce}-c\6ccacd8608530f
- C:\msocache\all users\{90140000-0044-0409-1000-0000000ff1ce}-c\idle.exe
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\b75386f1303e64
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe
- %WINDIR%\pchealth\errorrep\qsignoff\cc11b995f2a76d
- %WINDIR%\pchealth\errorrep\qsignoff\winlogon.exe
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\101b941d020240
- C:\recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe
- <Current directory>\886983d96e3d3e
- <Current directory>\csrss.exe
- %ALLUSERSPROFILE%\microsoft\drm\server\69ddcba757bf72
- %ALLUSERSPROFILE%\microsoft\drm\server\smss.exe
- %WINDIR%\addins\b75386f1303e64
- %WINDIR%\addins\taskhost.exe
- %ALLUSERSPROFILE%\templates\6ccacd8608530f
- %ALLUSERSPROFILE%\templates\idle.exe
- %ProgramFiles%\virusnews\6cb0b6c459d5d3
- %ProgramFiles%\virusnews\dwm.exe
- %ALLUSERSPROFILE%\microsoft toolkit\6203df4a6bafc7
- %ALLUSERSPROFILE%\microsoft toolkit\lsass.exe
- C:\far2\plugins\drawline\f3b6ecef712a24
- C:\far2\plugins\drawline\spoolsv.exe
- %ProgramFiles(x86)%\opera\29.0.1795.47\localization\f3b6ecef712a24
- %ALLUSERSPROFILE%\adobe\arm\{291aa914-a987-4ce9-bd63-ac0a92d435e5}\wudfhost.exe
- %ALLUSERSPROFILE%\adobe\arm\{291aa914-a987-4ce9-bd63-ac0a92d435e5}\480b7989c529f6
- '83.##0.173.194':80
- http://83.##0.173.194/1external/00Low/Javascript4public/Publictouniversal/wordpress/Php0GameAsync/Better/Better0proton7/Apitrack_/FlowerTest/53multiJs/wordpresscentraldownloads.php?7t##########...
- http://83.##0.173.194/1external/00Low/Javascript4public/Publictouniversal/wordpress/Php0GameAsync/Better/Better0proton7/Apitrack_/FlowerTest/53multiJs/wordpresscentraldownloads.php?oC##########...
- '%ProgramFiles(x86)%\opera\29.0.1795.47\localization\spoolsv.exe'
- '%ProgramFiles(x86)%\opera\29.0.1795.47\localization\spoolsv.exe' ' (with hidden window)
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc MINUTE /mo 10 /tr "'%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc MINUTE /mo 12 /tr "'%WINDIR%\PCHEALTH\ERRORREP\QSIGNOFF\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc ONLOGON /tr "'%WINDIR%\PCHEALTH\ERRORREP\QSIGNOFF\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogon" /sc ONSTART /tr "'%WINDIR%\PCHEALTH\ERRORREP\QSIGNOFF\winlogon.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'%WINDIR%\PCHEALTH\ERRORREP\QSIGNOFF\winlogon.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc MINUTE /mo 8 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc ONLOGON /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc ONSTART /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\taskhost.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc ONSTART /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONSTART /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Idle.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONSTART /tr "'%ProgramFiles%\vsmon\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'%ProgramFiles%\vsmon\System.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc MINUTE /mo 8 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONLOGON /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplore" /sc ONSTART /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "iexplorei" /sc MINUTE /mo 10 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\iexplore.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc MINUTE /mo 13 /tr "'%ProgramFiles(x86)%\Mozilla Thunderbird\uninstall\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONLOGON /tr "'%ProgramFiles(x86)%\Mozilla Thunderbird\uninstall\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONSTART /tr "'%ProgramFiles(x86)%\Mozilla Thunderbird\uninstall\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHostW" /sc MINUTE /mo 12 /tr "'%ProgramFiles(x86)%\Mozilla Thunderbird\uninstall\WUDFHost.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc MINUTE /mo 6 /tr "'%ALLUSERSPROFILE%\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc MINUTE /mo 8 /tr "'%ProgramFiles%\vsmon\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "System" /sc ONLOGON /tr "'%ProgramFiles%\vsmon\System.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc MINUTE /mo 14 /tr "'C:\Recovery\1195d5a8-f371-11e4-9c00-dd3082671db2\lsm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'<Current directory>\csrss.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONSTART /tr "'<Current directory>\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONSTART /tr "'%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc MINUTE /mo 7 /tr "'C:\Far2\Plugins\DrawLine\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Far2\Plugins\DrawLine\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONSTART /tr "'C:\Far2\Plugins\DrawLine\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Far2\Plugins\DrawLine\spoolsv.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc MINUTE /mo 10 /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsass" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\lsass.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'%ALLUSERSPROFILE%\Microsoft Toolkit\lsass.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "dwm" /sc MINUTE /mo 12 /tr "'%ProgramFiles%\VirusNews\dwm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "dwm" /sc ONLOGON /tr "'%ProgramFiles%\VirusNews\dwm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "dwm" /sc ONSTART /tr "'%ProgramFiles%\VirusNews\dwm.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONLOGON /tr "'%ProgramFiles(x86)%\Opera\29.0.1795.47\localization\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'%ProgramFiles%\VirusNews\dwm.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Templates\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Templates\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'%ALLUSERSPROFILE%\Templates\Idle.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc MINUTE /mo 13 /tr "'%WINDIR%\addins\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc ONLOGON /tr "'%WINDIR%\addins\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhost" /sc ONSTART /tr "'%WINDIR%\addins\taskhost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'%WINDIR%\addins\taskhost.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "smss" /sc MINUTE /mo 11 /tr "'%ALLUSERSPROFILE%\Microsoft\DRM\Server\smss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "smss" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Microsoft\DRM\Server\smss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "smss" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Microsoft\DRM\Server\smss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "smsss" /sc MINUTE /mo 10 /tr "'%ALLUSERSPROFILE%\Microsoft\DRM\Server\smss.exe'" /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc MINUTE /mo 14 /tr "'<Current directory>\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "csrss" /sc ONLOGON /tr "'<Current directory>\csrss.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "Idle" /sc MINUTE /mo 14 /tr "'%ALLUSERSPROFILE%\Templates\Idle.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHost" /sc ONSTART /tr "'%ALLUSERSPROFILE%\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\WUDFHost.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "WUDFHostW" /sc MINUTE /mo 13 /tr "'%ALLUSERSPROFILE%\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\WUDFHost.exe'" /f