Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows_Antimalware_Host_Syst' = 'C:\ProgramData\MicrosoftCorporation\Windows\System32\Isass.exe'
- '<SYSTEM32>\cmd.exe' /c echo Set oWS = WScript.CreateObject("WScript.Shell") > CreateShortcut.vbs & echo sLinkFile = "%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Isass.lnk" >> Create...
- '<SYSTEM32>\cscript.exe' CreateShortcut.vbs
- '<SYSTEM32>\schtasks.exe' /Create /SC MINUTE /MO 30 /TN "Windows_Antimalware_Host" /TR "C:\ProgramData\WindowsAppCertification\checker.vbs" /F
- '<SYSTEM32>\schtasks.exe' /Create /SC MINUTE /MO 5 /TN "Windows_Antimalware_Host_Systm" /TR "C:\ProgramData\MicrosoftCorporation\Windows\System32\Isass.exe" /F
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass', WindowName: ''
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- <Текущая директория>\CreateShortcut.vbs
- 'ap#.#nable.pw':80
- http://ap#.#nable.pw/2.0/method/checkConnection
- DNS ASK ap#.#nable.pw
- ClassName: '18467-41' WindowName: ''