Техническая информация
- '%TEMP%\adownloadtext.exe' <Полный путь к вирусу>
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\conhost.exe'
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_80070422_76a4385aa7fdcd3dc476f7ea51e8ea5565f02fd_0c291d8e\Report.wer
- C:\ProgramData\Microsoft\RAC\Temp\sql225F.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql223F.tmp
- %TEMP%\adownloader_config.ini
- %TEMP%\adownloadtext.exe
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOWDBRP7\fileadd_cyold[1].xml
- %TEMP%\AppCount.exe
- <LS_APPDATA>\Microsoft\Windows\Temporary Internet Files\Content.IE5\6P5SDOMI\AppCount[1].exe
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %TEMP%\adownloader_config.ini
- 'pa###.nowcdn.co.kr':80
- '20#.#6.232.182':80
- 'localhost':49327
- 'www.sp###down.co.kr':80
- pa###.nowcdn.co.kr/down/plusone/emulmax/Patch/tool1/AppCount.exe
- www.sp###down.co.kr/xml/fileadd_cyold.xml
- DNS ASK pa###.nowcdn.co.kr
- DNS ASK wa####.microsoft.com
- DNS ASK www.sp###down.co.kr
- '22#.0.0.252':5355