Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MicroUpdate' = '<SYSTEM32>\MSDCSC\csrcs.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'UserInit' = '<SYSTEM32>\userinit.exe,<SYSTEM32>\MSDCSC\csrcs.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = '%APPDATA%\Microsoft\update.exe,explorer.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run] 'work' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'work' = ''
- '<SYSTEM32>\MSDCSC\csrcs.exe'
- '%TEMP%\Stealer.exe'
- '%TEMP%\Hack.exe'
- '%TEMP%\IAVDKTHQGPEBTSH.exe'
- '%TEMP%\PROGA_STEAL.EXE'
- %TEMP%\PSE20\90bd60c8a3254a5d31994ed03ae7e0d0\php.ini
- %TEMP%\php5ts.dll
- %TEMP%\Hack.exe
- C:\ProgramData\Microsoft\RAC\Temp\sqlAEE4.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlAEF5.tmp
- %TEMP%\Stealer.exe
- %TEMP%\PROGA_STEAL.EXE
- %TEMP%\uqy16Zgxhq
- %TEMP%\aut3D9B.tmp
- %APPDATA%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.lnk
- <SYSTEM32>\MSDCSC\csrcs.exe
- %TEMP%\IAVDKTHQGPEBTSH.exe
- <SYSTEM32>\MSDCSC\csrcs.exe
- C:\ProgramData\Microsoft\RAC\Temp\sqlAEE4.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlAEF5.tmp
- %TEMP%\aut3D9B.tmp
- '18#.#34.114.159':1604
- 'vh##.#ostline.ru':21
- 'jw####.no-ip.org':1604
- DNS ASK dn#.##ftncsi.com
- DNS ASK vh##.#ostline.ru
- DNS ASK jw####.no-ip.org
- ClassName: 'Indicator' WindowName: '(null)'