Техническая информация
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\conhost.exe'
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_80070422_76a4385aa7fdcd3dc476f7ea51e8ea5565f02fd_0b7d2155\Report.wer
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- C:\ProgramData\Microsoft\RAC\Temp\sql226F.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql224F.tmp
- %TEMP%\RCXB08B.tmp
- %TEMP%\B01D.tmp
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- %TEMP%\AFBF.tmp
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %TEMP%\B01D.tmp
- %TEMP%\AFBF.tmp в %CommonProgramFiles%\Services\prnnsh.fs
- %TEMP%\RCXB08B.tmp в %TEMP%\B01D.tmp
- из <Полный путь к вирусу> в %TEMP%\B119.tmp
- '20#.#6.232.182':80
- DNS ASK wa####.microsoft.com
- '22#.0.0.252':5355