Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defender' = '"%APPDATA%\Microsoft\Windows Defender\defender.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Host-process' = '"%APPDATA%\Microsoft\Network\Connections\hostdl.exe"'
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %TEMP%\dw.log
- %TEMP%\2B358.dmp
- %TEMP%\AIMWARE Checker.exe
- %TEMP%\Miner.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %TEMP%\Miner.exe
- 'ip###ger.com':443
- 'wp#d':80
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK ip###ger.com
- DNS ASK wp#d
- '%APPDATA%\Microsoft\Network\Connections\hostdl.exe' "%TEMP%\Miner.exe"
- '%TEMP%\Miner.exe'
- '%TEMP%\AIMWARE Checker.exe'
- '%CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE' -x -s 368