Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'DatabaseNotifyer' = '<Полный путь к вирусу>'
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\sc.exe' start w32time task_started
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- C:\ProgramData\Microsoft\RAC\Temp\sqlD5F5.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlD5A6.tmp
- <Полный путь к вирусу>
- C:\ProgramData\Microsoft\RAC\Temp\sqlD5A6.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlD5F5.tmp
- <SYSTEM32>\Tasks\Microsoft\Windows Defender\MP Scheduled Scan
- '17#.#68.22.114':80
- 'localhost':49197
- 'localhost':49200
- 'localhost':49194
- 'localhost':49188
- '10#.#7.234.41':80
- 'localhost':49191
- 'localhost':49209
- 'localhost':49212
- '10#.#62.95.240':80
- '78.##.224.13':80
- '89.##1.110.59':80
- 'localhost':49203
- 'localhost':49206
- 'localhost':49185
- '17#.#04.88.236':80
- 'localhost':49167
- 'localhost':49170
- 'localhost':49164
- 'localhost':49158
- '77.#23.30.8':80
- 'localhost':49161
- 'localhost':49179
- 'localhost':49182
- '37.##9.106.106':80
- '17#.#4.248.247':80
- '18#.#6.80.119':80
- 'localhost':49173
- 'localhost':49176
- DNS ASK ti##.#indows.com
- 'ti##.#indows.com':123