Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'C:\%USERNAME%\csrss.exe' = 'C:\%USERNAME%\csrss.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'C:/%USERNAME%/csrss.exe' = '<Полный путь к вирусу>'
- C:\%USERNAME%\csrss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\google[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\microsoft[1].png
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\microsoft[1].png
- C:\%USERNAME%\csrss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\microsoft[1].png
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\microsoft[1].png
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1]
- '20#.#6.232.182':80
- 'localhost':1040
- 'localhost':1036
- '74.##5.232.51':80
- 20#.#6.232.182/global/en-us/homepage/PublishingImages/sprites/microsoft.png
- 74.##5.232.51/
- DNS ASK i.###rosoft.com
- DNS ASK www.google.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''