Підтримка
Цілодобова підтримка | Правила звернення

Зателефонуйте

Глобальна підтримка:
+7 (495) 789-45-86

Поширені запитання |  Форум |  Бот самопідтримки Telegram

Ваші запити

  • Всі: -
  • Незакриті: -
  • Останій: -

Зателефонуйте

Глобальна підтримка:
+7 (495) 789-45-86

Зв'яжіться з нами Незакриті запити: 

Профіль

Профіль

Trojan.Encoder.35954

Добавлен в вирусную базу Dr.Web: 2022-09-26

Описание добавлено:

Technical Information

To ensure autorun and distribution
Modifies the following registry keys
  • [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'encrypt' = '"%LOCALAPPDATA%\encrypt\encrypt.exe" -e all -sd -crc '
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tv_x64.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tv_w32.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeamViewer_Service.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeamViewer.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tbirdconfig.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon64.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ssms.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlwriter.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlservr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlmangr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlbrowser.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlagent.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sql.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqbcoreservice.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SimplyConnectionManager.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\raw_agent_svc.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vxmon.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wdswfsafe.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsqmcons.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CompatTelRunner.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchProtocolHost.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchApp.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlservrs.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SystemExplorer.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\r.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServerView.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServer.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsa_service.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\Software\Classes\mimicfile\shell\open\command] '' = 'notepad.exe "%LOCALAPPDATA%\HACKLENDINIZ.txt"'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAgui.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineSettings.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspub.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msaccess.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isqlplussvc.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\httpd.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdlauncher.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdhost.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbguard.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EnterpriseClient.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\encsvc.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dbsnmp.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dbeng50.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Creative Cloud.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKCU\Software\Classes\exefile\shell\open\command] '' = '"%1" %*'
  • [HKLM\Software\Classes\exefile\shell\open\command] '' = '"%1" %*'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopqos.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopservice.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-nt.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine_x86.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW64.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qbupdate.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBIDPService.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgrN.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\python.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wpython.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\node.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pvlsvr.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oracle.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocssd.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocomm.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocautoupds.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe] 'Debugger' = '<SYSTEM32>\Systray.exe'
  • [HKLM\Software\Classes\.com] '' = 'mimicfile'
Malicious functions
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
  • Windows Update
modifies the following system settings:
  • [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoClose' = '00000001'
  • [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'StartMenuLogOff' = '00000001'
Modifies file system
Creates the following files
  • C:\tempenc\7za.exe
  • C:\temp\session.tmp
  • C:\hacklendiniz.txt
  • %LOCALAPPDATA%\encrypt\session.tmp
  • %LOCALAPPDATA%\encrypt\sdel64.exe
  • %LOCALAPPDATA%\encrypt\sdel.exe
  • %LOCALAPPDATA%\encrypt\everything64.dll
  • %LOCALAPPDATA%\encrypt\everything32.dll
  • %LOCALAPPDATA%\encrypt\everything2.ini
  • %LOCALAPPDATA%\encrypt\everything.ini
  • %LOCALAPPDATA%\encrypt\everything.exe
  • %LOCALAPPDATA%\encrypt\everything.db
  • %LOCALAPPDATA%\encrypt\encrypt.exe
  • %LOCALAPPDATA%\encrypt\7za.exe
  • C:\tempenc\session.tmp
  • C:\tempenc\sdel64.exe
  • C:\tempenc\sdel.exe
  • C:\tempenc\everything64.dll
  • C:\tempenc\everything32.dll
  • C:\tempenc\everything2.ini
  • C:\tempenc\everything.ini
  • C:\tempenc\everything.exe
  • C:\tempenc\everything.db
  • C:\tempenc\encrypt.exe
  • %LOCALAPPDATA%\hacklendiniz.txt
  • C:\temp\hashlist.txt
Moves the following files
  • from %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\199a0618-6d48-4205-858d-6b9a8ba9e913 to %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\199a0618-6d48-4205-858d-6b9a8ba9e913.fortservicebackup@gmail.com
  • from %ProgramFiles%\mozilla thunderbird\precomplete to %ProgramFiles%\mozilla thunderbird\precomplete.fortservicebackup@gmail.com
  • from %ProgramFiles%\mozilla thunderbird\removed-files to %ProgramFiles%\mozilla thunderbird\removed-files.fortservicebackup@gmail.com
  • from %APPDATA%\thunderbird\crash reports\installtime20210406220621 to %APPDATA%\thunderbird\crash reports\installtime20210406220621.fortservicebackup@gmail.com
  • from %APPDATA%\mozilla\firefox\crash reports\installtime20200708170202 to %APPDATA%\mozilla\firefox\crash reports\installtime20200708170202.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\copyright to %ProgramFiles%\java\jre1.8.0_45\copyright.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\license to %ProgramFiles%\java\jre1.8.0_45\license.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\classlist to %ProgramFiles%\java\jre1.8.0_45\lib\classlist.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\deploy\ffjcext.zip to %ProgramFiles%\java\jre1.8.0_45\lib\deploy\ffjcext.zip.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\ext\meta-index to %ProgramFiles%\java\jre1.8.0_45\lib\ext\meta-index.fortservicebackup@gmail.com
  • from %ProgramFiles%\mozilla firefox\removed-files to %ProgramFiles%\mozilla firefox\removed-files.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\meta-index to %ProgramFiles%\java\jre1.8.0_45\lib\meta-index.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\security\cacerts to %ProgramFiles%\java\jre1.8.0_45\lib\security\cacerts.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\release to %ProgramFiles%\java\jre1.8.0_45\release.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\tzmappings to %ProgramFiles%\java\jre1.8.0_45\lib\tzmappings.fortservicebackup@gmail.com
  • from %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\2a211dea-1f81-457a-9f7c-a174126ff0dd to %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\2a211dea-1f81-457a-9f7c-a174126ff0dd.fortservicebackup@gmail.com
  • from %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\dc35f7c9-5b80-4042-a301-e84d8619b27e to %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\dc35f7c9-5b80-4042-a301-e84d8619b27e.fortservicebackup@gmail.com
  • from %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\9cd37e15-817f-4044-81be-e43af1dfc595 to %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\9cd37e15-817f-4044-81be-e43af1dfc595.fortservicebackup@gmail.com
  • from %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\71d7d59d-5451-4f15-bb9e-420e88a3061f to %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\71d7d59d-5451-4f15-bb9e-420e88a3061f.fortservicebackup@gmail.com
  • from %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\22a456d0-5d02-445b-9603-4fe4b9e5c45c to %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\22a456d0-5d02-445b-9603-4fe4b9e5c45c.fortservicebackup@gmail.com
  • from %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\d8154144-ac52-40e8-b685-b640783b2c0d to %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\d8154144-ac52-40e8-b685-b640783b2c0d.fortservicebackup@gmail.com
  • from %ProgramFiles%\java\jre1.8.0_45\lib\security\blacklist to %ProgramFiles%\java\jre1.8.0_45\lib\security\blacklist.fortservicebackup@gmail.com
  • from %ProgramFiles%\mozilla firefox\precomplete to %ProgramFiles%\mozilla firefox\precomplete.fortservicebackup@gmail.com
Modifies the following files
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\39d80535a21e286b3c662765c5f09aceb927e77d.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\google\chrome\user data\default\current session.fortservicebackup@gmail.com
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\2a211dea-1f81-457a-9f7c-a174126ff0dd.fortservicebackup@gmail.com
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\dc35f7c9-5b80-4042-a301-e84d8619b27e.fortservicebackup@gmail.com
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\9cd37e15-817f-4044-81be-e43af1dfc595.fortservicebackup@gmail.com
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\saved-telemetry-pings\71d7d59d-5451-4f15-bb9e-420e88a3061f.fortservicebackup@gmail.com
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\22a456d0-5d02-445b-9603-4fe4b9e5c45c.fortservicebackup@gmail.com
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\d8154144-ac52-40e8-b685-b640783b2c0d.fortservicebackup@gmail.com
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\saved-telemetry-pings\199a0618-6d48-4205-858d-6b9a8ba9e913.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\ca7b107e288f94eb98b38094e8c5546e41a7b930.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\340a10d652987df5e54312e31f5c22f6e8dba574.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\33cb8de6e60bfd610c06292520704ae36e4ce009.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\4c5a1680d3b63616e845aca183dd3af5ad89c635.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\a2f1b3da369eab62efa8bdaf2aaad94562df2b2f.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\2b8fb3a7c1e8990ce64886d66718692d2b2ed2bc.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\b7fbaf67c17f178528b0f05cb710c8f8fe07f664.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\b76c4108a0c23ba7cf4ab006198081ed5af73137.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\7e29219d9f0290d87513ebd3712a6dc74a175f34.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\1d048d4c93ba7775f1c2e11f1117d0fde4760f65.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\c2bcd190e3dad6b7dc138eb689593de077e96131.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\d0ed2eaa2bb547ad2b2a4e6eaed8931f54b6c8ec.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\1e9395fbb58031ece972bfe7a83eb202a6f3ea4f.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\13a9d78e63abd60764cbeb0bbd193b7b831d4c13.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\82c47fa9f5f29d08908329a836215460fd85b37b.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\9c571ec4d1abdf04dec3542cba1cbcdb49632bf7.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\bc9a334d14ae8d5cdcf1f5f5128ba1f4cdd083ac.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\2cb84dd9abb4e1485d83397c59b193094e1abfc7.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\cache2\entries\a72798def4f924983d5a0db82d383c613b515ff2.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\google\chrome\user data\default\cache\data_1.fortservicebackup@gmail.com
  • %LOCALAPPDATA%\google\chrome\user data\default\cache\data_0.fortservicebackup@gmail.com
Modifies multiple files.
Network activity
Connects to
  • '<LOCALNET>.62.0':445
  • '<LOCALNET>.62.161':445
  • '<LOCALNET>.62.162':445
  • '<LOCALNET>.62.163':445
  • '<LOCALNET>.62.164':445
  • '<LOCALNET>.62.165':445
  • '<LOCALNET>.62.166':445
  • '<LOCALNET>.62.167':445
  • '<LOCALNET>.62.168':445
  • '<LOCALNET>.62.169':445
  • '<LOCALNET>.62.170':445
  • '<LOCALNET>.62.171':445
  • '<LOCALNET>.62.172':445
  • '<LOCALNET>.62.173':445
  • '<LOCALNET>.62.175':445
  • '<LOCALNET>.62.189':445
  • '<LOCALNET>.62.176':445
  • '<LOCALNET>.62.177':445
  • '<LOCALNET>.62.178':445
  • '<LOCALNET>.62.179':445
  • '<LOCALNET>.62.180':445
  • '<LOCALNET>.62.181':445
  • '<LOCALNET>.62.182':445
  • '<LOCALNET>.62.183':445
  • '<LOCALNET>.62.184':445
  • '<LOCALNET>.62.185':445
  • '<LOCALNET>.62.186':445
  • '<LOCALNET>.62.187':445
  • '<LOCALNET>.62.188':445
  • '<LOCALNET>.62.160':445
  • '<LOCALNET>.62.174':445
  • '<LOCALNET>.62.159':445
  • '<LOCALNET>.62.142':445
  • '<LOCALNET>.62.129':445
  • '<LOCALNET>.62.130':445
  • '<LOCALNET>.62.131':445
  • '<LOCALNET>.62.132':445
  • '<LOCALNET>.62.133':445
  • '<LOCALNET>.62.134':445
  • '<LOCALNET>.62.135':445
  • '<LOCALNET>.62.136':445
  • '<LOCALNET>.62.137':445
  • '<LOCALNET>.62.138':445
  • '<LOCALNET>.62.139':445
  • '<LOCALNET>.62.140':445
  • '<LOCALNET>.62.141':445
  • '<LOCALNET>.62.143':445
  • '<LOCALNET>.62.157':445
  • '<LOCALNET>.62.144':445
  • '<LOCALNET>.62.145':445
  • '<LOCALNET>.62.146':445
  • '<LOCALNET>.62.147':445
  • '<LOCALNET>.62.148':445
  • '<LOCALNET>.62.149':445
  • '<LOCALNET>.62.150':445
  • '<LOCALNET>.62.151':445
  • '<LOCALNET>.62.152':445
  • '<LOCALNET>.62.153':445
  • '<LOCALNET>.62.154':445
  • '<LOCALNET>.62.155':445
  • '<LOCALNET>.62.156':445
  • '<LOCALNET>.62.158':445
  • '<LOCALNET>.62.207':445
  • '<LOCALNET>.62.253':445
  • '<LOCALNET>.62.192':445
  • '<LOCALNET>.62.225':445
  • '<LOCALNET>.62.226':445
  • '<LOCALNET>.62.227':445
  • '<LOCALNET>.62.228':445
  • '<LOCALNET>.62.229':445
  • '<LOCALNET>.62.230':445
  • '<LOCALNET>.62.231':445
  • '<LOCALNET>.62.232':445
  • '<LOCALNET>.62.233':445
  • '<LOCALNET>.62.234':445
  • '<LOCALNET>.62.235':445
  • '<LOCALNET>.62.236':445
  • '<LOCALNET>.62.237':445
  • '<LOCALNET>.62.239':445
  • '<LOCALNET>.62.191':445
  • '<LOCALNET>.62.240':445
  • '<LOCALNET>.62.241':445
  • '<LOCALNET>.62.242':445
  • '<LOCALNET>.62.243':445
  • '<LOCALNET>.62.244':445
  • '<LOCALNET>.62.245':445
  • '<LOCALNET>.62.246':445
  • '<LOCALNET>.62.247':445
  • '<LOCALNET>.62.248':445
  • '<LOCALNET>.62.249':445
  • '<LOCALNET>.62.250':445
  • '<LOCALNET>.62.251':445
  • '<LOCALNET>.62.252':445
  • '<LOCALNET>.62.224':445
  • '<LOCALNET>.62.128':445
  • '<LOCALNET>.62.223':445
  • '<LOCALNET>.62.206':445
  • '<LOCALNET>.62.193':445
  • '<LOCALNET>.62.194':445
  • '<LOCALNET>.62.195':445
  • '<LOCALNET>.62.196':445
  • '<LOCALNET>.62.197':445
  • '<LOCALNET>.62.198':445
  • '<LOCALNET>.62.199':445
  • '<LOCALNET>.62.200':445
  • '<LOCALNET>.62.201':445
  • '<LOCALNET>.62.202':445
  • '<LOCALNET>.62.203':445
  • '<LOCALNET>.62.204':445
  • '<LOCALNET>.62.205':445
  • '<LOCALNET>.62.190':445
  • '<LOCALNET>.62.221':445
  • '<LOCALNET>.62.208':445
  • '<LOCALNET>.62.209':445
  • '<LOCALNET>.62.210':445
  • '<LOCALNET>.62.211':445
  • '<LOCALNET>.62.212':445
  • '<LOCALNET>.62.213':445
  • '<LOCALNET>.62.214':445
  • '<LOCALNET>.62.215':445
  • '<LOCALNET>.62.216':445
  • '<LOCALNET>.62.217':445
  • '<LOCALNET>.62.218':445
  • '<LOCALNET>.62.219':445
  • '<LOCALNET>.62.220':445
  • '<LOCALNET>.62.222':445
  • '<LOCALNET>.62.238':445
  • '<LOCALNET>.62.127':445
  • '<LOCALNET>.62.110':445
  • '<LOCALNET>.62.33':445
  • '<LOCALNET>.62.34':445
  • '<LOCALNET>.62.35':445
  • '<LOCALNET>.62.36':445
  • '<LOCALNET>.62.37':445
  • '<LOCALNET>.62.38':445
  • '<LOCALNET>.62.39':445
  • '<LOCALNET>.62.40':445
  • '<LOCALNET>.62.41':445
  • '<LOCALNET>.62.42':445
  • '<LOCALNET>.62.43':445
  • '<LOCALNET>.62.44':445
  • '<LOCALNET>.62.45':445
  • '<LOCALNET>.62.47':445
  • '<LOCALNET>.62.61':445
  • '<LOCALNET>.62.48':445
  • '<LOCALNET>.62.49':445
  • '<LOCALNET>.62.50':445
  • '<LOCALNET>.62.51':445
  • '<LOCALNET>.62.52':445
  • '<LOCALNET>.62.53':445
  • '<LOCALNET>.62.54':445
  • '<LOCALNET>.62.55':445
  • '<LOCALNET>.62.56':445
  • '<LOCALNET>.62.57':445
  • '<LOCALNET>.62.58':445
  • '<LOCALNET>.62.59':445
  • '<LOCALNET>.62.60':445
  • '<LOCALNET>.62.32':445
  • '<LOCALNET>.62.46':445
  • '<LOCALNET>.62.31':445
  • '<LOCALNET>.62.14':445
  • '<LOCALNET>.62.1':445
  • '<LOCALNET>.62.2':445
  • '<LOCALNET>.62.3':445
  • '<LOCALNET>.62.4':445
  • '<LOCALNET>.62.5':445
  • '<LOCALNET>.62.6':445
  • '<LOCALNET>.62.7':445
  • '<LOCALNET>.62.8':445
  • '<LOCALNET>.62.9':445
  • '<LOCALNET>.62.10':445
  • '<LOCALNET>.62.11':445
  • '<LOCALNET>.62.12':445
  • '<LOCALNET>.62.13':445
  • '<LOCALNET>.62.15':445
  • '<LOCALNET>.62.29':445
  • '<LOCALNET>.62.16':445
  • '<LOCALNET>.62.17':445
  • '<LOCALNET>.62.18':445
  • '<LOCALNET>.62.19':445
  • '<LOCALNET>.62.20':445
  • '<LOCALNET>.62.21':445
  • '<LOCALNET>.62.22':445
  • '<LOCALNET>.62.23':445
  • '<LOCALNET>.62.24':445
  • '<LOCALNET>.62.25':445
  • '<LOCALNET>.62.26':445
  • '<LOCALNET>.62.27':445
  • '<LOCALNET>.62.28':445
  • '<LOCALNET>.62.30':445
  • '<LOCALNET>.62.79':445
  • '<LOCALNET>.62.125':445
  • '<LOCALNET>.62.64':445
  • '<LOCALNET>.62.97':445
  • '<LOCALNET>.62.98':445
  • '<LOCALNET>.62.99':445
  • '<LOCALNET>.62.100':445
  • '<LOCALNET>.62.101':445
  • '<LOCALNET>.62.102':445
  • '<LOCALNET>.62.103':445
  • '<LOCALNET>.62.104':445
  • '<LOCALNET>.62.105':445
  • '<LOCALNET>.62.106':445
  • '<LOCALNET>.62.107':445
  • '<LOCALNET>.62.108':445
  • '<LOCALNET>.62.109':445
  • '<LOCALNET>.62.111':445
  • '<LOCALNET>.62.63':445
  • '<LOCALNET>.62.112':445
  • '<LOCALNET>.62.113':445
  • '<LOCALNET>.62.114':445
  • '<LOCALNET>.62.115':445
  • '<LOCALNET>.62.116':445
  • '<LOCALNET>.62.117':445
  • '<LOCALNET>.62.118':445
  • '<LOCALNET>.62.119':445
  • '<LOCALNET>.62.120':445
  • '<LOCALNET>.62.121':445
  • '<LOCALNET>.62.122':445
  • '<LOCALNET>.62.123':445
  • '<LOCALNET>.62.124':445
  • '<LOCALNET>.62.96':445
  • '<LOCALNET>.62.126':445
  • '<LOCALNET>.62.95':445
  • '<LOCALNET>.62.78':445
  • '<LOCALNET>.62.65':445
  • '<LOCALNET>.62.66':445
  • '<LOCALNET>.62.67':445
  • '<LOCALNET>.62.68':445
  • '<LOCALNET>.62.69':445
  • '<LOCALNET>.62.70':445
  • '<LOCALNET>.62.71':445
  • '<LOCALNET>.62.72':445
  • '<LOCALNET>.62.73':445
  • '<LOCALNET>.62.74':445
  • '<LOCALNET>.62.75':445
  • '<LOCALNET>.62.76':445
  • '<LOCALNET>.62.77':445
  • '<LOCALNET>.62.62':445
  • '<LOCALNET>.62.93':445
  • '<LOCALNET>.62.80':445
  • '<LOCALNET>.62.81':445
  • '<LOCALNET>.62.82':445
  • '<LOCALNET>.62.83':445
  • '<LOCALNET>.62.84':445
  • '<LOCALNET>.62.85':445
  • '<LOCALNET>.62.86':445
  • '<LOCALNET>.62.87':445
  • '<LOCALNET>.62.88':445
  • '<LOCALNET>.62.89':445
  • '<LOCALNET>.62.90':445
  • '<LOCALNET>.62.91':445
  • '<LOCALNET>.62.92':445
  • '<LOCALNET>.62.94':445
  • '<LOCALNET>.62.254':445
Miscellaneous
Searches for the following windows
  • ClassName: 'EDIT' WindowName: ''
  • ClassName: 'EVERYTHING_TASKBAR_NOTIFICATION' WindowName: ''
Creates and executes the following
  • 'C:\tempenc\encrypt.exe' -e all -sd -crc
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e all -sd -crc
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e watch -pid 1092 -! -e all -sd -crc
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e ul1
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e ul2
  • '%LOCALAPPDATA%\encrypt\everything.exe' -startup
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -H off' (with hidden window)
  • '%LOCALAPPDATA%\encrypt\everything.exe' -startup' (with hidden window)
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e ul2' (with hidden window)
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e ul1' (with hidden window)
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e watch -pid 1092 -! -e all -sd -crc' (with hidden window)
  • '%LOCALAPPDATA%\encrypt\encrypt.exe' -e all -sd -crc' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0' (with hidden window)
  • '<SYSTEM32>\powercfg.exe' -S e9a42b02-d5df-448d-aa00-03f14749eb61' (with hidden window)
Executes the following
  • '<SYSTEM32>\powercfg.exe' -H off
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
  • '<SYSTEM32>\powercfg.exe' -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
  • '<SYSTEM32>\powercfg.exe' -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
  • '<SYSTEM32>\powercfg.exe' -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
  • '<SYSTEM32>\powercfg.exe' -S e9a42b02-d5df-448d-aa00-03f14749eb61

Рекомендации по лечению

  1. В случае если операционная система способна загрузиться (в штатном режиме или режиме защиты от сбоев), скачайте лечащую утилиту Dr.Web CureIt! и выполните с ее помощью полную проверку вашего компьютера, а также используемых вами переносных носителей информации.
  2. Если загрузка операционной системы невозможна, измените настройки BIOS вашего компьютера, чтобы обеспечить возможность загрузки ПК с компакт-диска или USB-накопителя. Скачайте образ аварийного диска восстановления системы Dr.Web® LiveDisk или утилиту записи Dr.Web® LiveDisk на USB-накопитель, подготовьте соответствующий носитель. Загрузив компьютер с использованием данного носителя, выполните его полную проверку и лечение обнаруженных угроз.
Скачать Dr.Web

По серийному номеру

Выполните полную проверку системы с использованием Антивируса Dr.Web Light для macOS. Данный продукт можно загрузить с официального сайта Apple App Store.

На загруженной ОС выполните полную проверку всех дисковых разделов с использованием продукта Антивирус Dr.Web для Linux.

Скачать Dr.Web

По серийному номеру

  1. Если мобильное устройство функционирует в штатном режиме, загрузите и установите на него бесплатный антивирусный продукт Dr.Web для Android Light. Выполните полную проверку системы и используйте рекомендации по нейтрализации обнаруженных угроз.
  2. Если мобильное устройство заблокировано троянцем-вымогателем семейства Android.Locker (на экране отображается обвинение в нарушении закона, требование выплаты определенной денежной суммы или иное сообщение, мешающее нормальной работе с устройством), выполните следующие действия:
    • загрузите свой смартфон или планшет в безопасном режиме (в зависимости от версии операционной системы и особенностей конкретного мобильного устройства эта процедура может быть выполнена различными способами; обратитесь за уточнением к инструкции, поставляемой вместе с приобретенным аппаратом, или напрямую к его производителю);
    • после активации безопасного режима установите на зараженное устройство бесплатный антивирусный продукт Dr.Web для Android Light и произведите полную проверку системы, выполнив рекомендации по нейтрализации обнаруженных угроз;
    • выключите устройство и включите его в обычном режиме.

Подробнее о Dr.Web для Android

Демо бесплатно на 14 дней

Выдаётся при установке