Citing foreign media ZDNet reported that in an in-depth investigation into the solarwinds hacking incident, Microsoft cooperated with a technology alliance to seize and sink the domain name that played a key role in the incident. The domain name is avsvmcloud [.] com, as a command and control (C & C) server for malware, delivered to about 18000 solarwinds customers through Trojan updates of the company’s Orion application. < / P > < p > according to the analysis of fireeye, the security company, the C & C domain name will reply to a DNS response containing the CNAME field, which contains the information of another domain name from which the Sunburst malware will obtain further instructions and additional payloads for execution on the infected company’s network. Earlier today, an alliance of technology companies seized and removed avsvmcloud [.] com and transferred the domain name to Microsoft. Sources familiar with today’s operation described the seizure as a protective effort to prevent the threat behind solarwinds hackers from delivering new orders to infected computers. The release and download schedule of Microsoft Flight Simulation varies from region to region