To complicate detection of its presence in the operating system,
forces the system hide from view:
hidden files
Creates and executes the following:
<SYSTEM32>\lgpvdngrn\csrss.exe
Executes the following:
<SYSTEM32>\cmd.exe /c %TEMP%\del2.bat
Terminates or attempts to terminate
the following user processes:
zlclient.exe
smc.exe
outpost.exe
Searches for registry branches where third party applications store passwords:
[<HKCU>\Software\Microsoft\MessengerService]
Modifies file system :
Creates the following files:
<SYSTEM32>\netstat.com
<SYSTEM32>\taskkill.com
<SYSTEM32>\lgpvdngrn\csrss.ini
<SYSTEM32>\lgpvdngrn\csrss.exe
%TEMP%\del2.bat
Sets the 'hidden' attribute to the following files:
<SYSTEM32>\taskkill.com
%HOMEPATH%\Start Menu\Programs\Startup\csrss.lnk
<SYSTEM32>\lgpvdngrn\csrss.exe
<SYSTEM32>\netstat.com
Deletes the following files:
<DRIVERS>\etc\hosts
<SYSTEM32>\lgpvdngrn\csrss.ini
Substitutes the HOSTS file.
Miscellaneous:
Searches for the following windows:
ClassName: 'Indicator' WindowName: ''
ClassName: 'Shell_TrayWnd' WindowName: ''
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more