Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '40819<Имя вируса>.exe' = '%APPDATA%\Roaming\40819<Имя вируса>.exe'
- '%APPDATA%\Roaming\service\service.exe'
- '%TEMP%\service.exe'
- '%APPDATA%\Roaming\40819<Имя вируса>.exe'
- '<SYSTEM32>\PING.EXE' 1.1.1.1 -n 1 -w 3000
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- '<SYSTEM32>\cmd.exe' /c <LS_APPDATA>\Tempscratch.cmd
- '<SYSTEM32>\conhost.exe'
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- %APPDATA%\Roaming\service\service.exe
- C:\ProgramData\Microsoft\RAC\Temp\sql228E.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sql226E.tmp
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_80070422_76a4385aa7fdcd3dc476f7ea51e8ea5565f02fd_0cb9204c\Report.wer
- %TEMP%\DSC572982.png
- %APPDATA%\Roaming\40819<Имя вируса>.exe
- %TEMP%\service.exe
- %TEMP%\autBFC5.tmp
- %TEMP%\aut271F.tmp
- <LS_APPDATA>\Tempscratch.cmd
- %APPDATA%\Roaming\40819<Имя вируса>.exe
- %TEMP%\service.exe
- %WINDIR%\Temp\MPTelemetrySubmit\watson_manifest.txt
- %WINDIR%\Temp\MPTelemetrySubmit\client_manifest.txt
- %TEMP%\autBFC5.tmp
- <LS_APPDATA>\Tempscratch.cmd
- %TEMP%\aut271F.tmp
- '20#.#6.232.182':80
- DNS ASK wa####.microsoft.com
- '22#.0.0.252':5355