Техническая информация
- <SYSTEM32>\cmd.exe /c """%TEMP%\removeMe5423.bat"" "
- <SYSTEM32>\netsh.exe firewall add allowedprogram mshost.exe 1 ENABLE
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- %TEMP%\removeMe5423.bat
- ClassName: '' WindowName: 'Auto Start and Process Viewer : www.konradp.com'
- ClassName: '' WindowName: 'Remote Process Viewer for Windows Networks'
- ClassName: '' WindowName: 'CurrProcess'
- ClassName: '' WindowName: 'Security Task Manager - Alexander Neuber'
- ClassName: '' WindowName: 'Windows Security Alert'
- ClassName: '' WindowName: 'BitDefender Firewall Alert'
- ClassName: '' WindowName: 'Process Heap Viewer - www.SecurityXploded.com'
- ClassName: '' WindowName: 'Soft191 Process Viewer'
- ClassName: '' WindowName: 'SwitchSniffer v1.3.2.0 UnRegistered'
- ClassName: '' WindowName: 'Project 1 - Packet Analyzer - Colasoft Capsa'
- ClassName: '' WindowName: 'TCPView - Sysinternals: www.sysinternals.com'
- ClassName: '' WindowName: 'Ether Detect'
- ClassName: '' WindowName: 'The Wireshark Network Analyzer'
- ClassName: '' WindowName: 'PIAFCTM - Stopped'
- ClassName: '' WindowName: 'SwitchSniffer v1.3.2.0 Registered'
- ClassName: '' WindowName: 'Process Explorer - Sysinternals: www.sysinternals.com'
- ClassName: '' WindowName: 'PIAFCTM - Waiting'