Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Security Protection' = 'C:\ProgramData\defender.exe'
- [<HKLM>\SYSTEM\ControlSet001\Control\Print\Providers\649fc] 'Name' = '%TEMP%\4A29.tmp'
- 'C:\ProgramData\defender.exe'
- '<SYSTEM32>\spoolsv.exe'
- '<SYSTEM32>\wermgr.exe' "-queuereporting_svc" "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_spoolsv.exe_2ae6f2ea86b25a8499c42442fa27c34fb910f_cab_04eedd15"
- <SYSTEM32>\spoolsv.exe
- <Служебный элемент>
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\cmd.exe
- C:\Users\Public\Desktop\Security Protection.lnk
- %TEMP%\~DF48EF4FF5DAB58AA7.TMP
- %TEMP%\4A29.tmp
- C:\ProgramData\defender
- C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_spoolsv.exe_2ae6f2ea86b25a8499c42442fa27c34fb910f_cab_04eedd15\Report.wer.tmp в C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_spoolsv.exe_2ae6f2ea86b25a8499c42442fa27c34fb910f_cab_04eedd15\Report.wer
- C:\ProgramData\defender в C:\ProgramData\defender.exe
- из <Полный путь к вирусу> в %TEMP%\2A4B.tmp
- DNS ASK so####download.com
- DNS ASK dn#.##ftncsi.com
- DNS ASK he###hips.com
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''