Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'AntiMalware' = '"%APPDATA%\AntiMalware.exe"'
- '%APPDATA%\csrssss.exe'
- '%APPDATA%\csrss.exe'
- '%APPDATA%\csrssss.exe' (загружен из сети Интернет)
- '%APPDATA%\csrss.exe' (загружен из сети Интернет)
- '<SYSTEM32>\svchost.exe'
- <SYSTEM32>\svchost.exe
- %APPDATA%\csrssss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\x[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\up[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\up[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\get[1].php
- %APPDATA%\AntiMalware.exe
- %APPDATA%\csrss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\x32[1].exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\up[1].exe
- %APPDATA%\AntiMalware.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\get[1].php
- 'localhost':1042
- 'os###info.co.za':80
- '74.##5.232.51':80
- os###info.co.za//loadfile/x.exe
- os###info.co.za//loadfile/up.exe
- os###info.co.za//get.php?na###########
- os###info.co.za//loadfile/x32.exe
- DNS ASK os###info.co.za
- DNS ASK google.com
- ClassName: 'IEFrame' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'