Техническая информация
- <SYSTEM32>\tasks\drivers
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- %APPDATA%\drivers\drivers.exe
- http://ip##pi.com/json/
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- DNS ASK pa###bin.com
- DNS ASK ip##pi.com
- DNS ASK xX#######Xx-37712.portmap.host
- DNS ASK microsoft.com
- '%APPDATA%\drivers\drivers.exe'
- '%APPDATA%\drivers\drivers.exe' ' (со скрытым окном)
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath %APPDATA%\drivers
- '%WINDIR%\syswow64\cmd.exe' /C schtasks /create /tn \drivers /tr %APPDATA%\drivers\drivers.exe /sc MINUTE /mo 1
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /tn \drivers /tr %APPDATA%\drivers\drivers.exe /sc MINUTE /mo 1
- '<SYSTEM32>\taskeng.exe' {5214CC00-F123-4BFB-9166-74F4A68A4341} S-1-5-21-1960123792-2022915161-3775307078-1001:efgwfjvbv\user:Interactive:[1]