Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'NetworkChecker' = '<Полный путь к вирусу>'
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\sc.exe' start w32time task_started
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- C:\ProgramData\Microsoft\RAC\Temp\sqlC0FE.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlBCF8.tmp
- <Полный путь к вирусу>
- C:\ProgramData\Microsoft\RAC\Temp\sqlBCF8.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlC0FE.tmp
- '77.##2.124.1':80
- 'localhost':49164
- '46.##0.10.84':80
- 'localhost':49158
- '17#.#37.190.212':80
- 'localhost':49161
- DNS ASK dn#.##ftncsi.com
- DNS ASK ti##.#indows.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'