Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Windows' = 'C:\Documents'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows' = 'C:\Documents'
- '%TEMP%\csrss.exe' -reg %TEMP%\Windows.exe -proc 2956 %TEMP%\Windows.exe
- '%TEMP%\Windows.exe'
- '<SYSTEM32>\schtasks.exe' /Create /TN "Update\Windows" /XML "%TEMP%\354936515.xml"
- '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %APPDATA%\l_34a21908ee864aa6882705d9f47aab5c.jpg
- %TEMP%\354936515.xml
- %TEMP%\Windows.exe:ZONE.identifier
- %TEMP%\csrss.exe
- %APPDATA%\23EF5514-3059-436F-A4A7-4CEFAAB20EB1\run.dat
- %TEMP%\csrss.exe:ZONE.identifier
- %HOMEPATH%\Recent\l_34a21908ee864aa6882705d9f47aab5c.lnk
- %APPDATA%\l_34a21908ee864aa6882705d9f47aab5c.jpg
- <Полный путь к вирусу>:ZONE.identifier
- %TEMP%\Windows.exe
- %HOMEPATH%\Recent\Application Data.lnk
- %TEMP%\csrss.exe
- %TEMP%\Windows.exe
- %TEMP%\Windows.exe:ZONE.identifier
- %TEMP%\354936515.xml
- 'localhost':9033
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'ShImgVw:CPreviewWnd' WindowName: ''