Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'admatching' = '<Полный путь к вирусу>'
- '<SYSTEM32>\wsqmcons.exe'
- '<SYSTEM32>\rundll32.exe' dfdts.dll,DfdGetDefaultPolicyAndSMART
- '<SYSTEM32>\schtasks.exe' /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader"
- '<SYSTEM32>\sc.exe' start w32time task_started
- '<SYSTEM32>\sdclt.exe' /CONFIGNOTIFICATION
- '<SYSTEM32>\taskhost.exe' $(Arg0)
- C:\ProgramData\Microsoft\RAC\Temp\sqlCD3E.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlCCD0.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlCCD0.tmp
- C:\ProgramData\Microsoft\RAC\Temp\sqlCD3E.tmp
- <SYSTEM32>\Tasks\Microsoft\Windows Defender\MP Scheduled Scan
- 'ap#.###atching.co.kr':80
- ap#.###atching.co.kr/admatching/info.php?pi##########################
- DNS ASK ti##.#indows.com
- DNS ASK ap#.###atching.co.kr
- 'ti##.#indows.com':123
- ClassName: 'Indicator' WindowName: ''