Техническая информация
- <SYSTEM32>\tasks\drivers
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- %APPDATA%\drivers\drivers.exe
- %APPDATA%\logs\03-25-2020
- 'hu#######-33967.portmap.host':33967
- http://ip##pi.com/json/
- DNS ASK pa###bin.com
- DNS ASK ip##pi.com
- DNS ASK hu#######-33967.portmap.host
- '%APPDATA%\drivers\drivers.exe'
- '%APPDATA%\drivers\drivers.exe' ' (со скрытым окном)
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath %APPDATA%\drivers
- '%WINDIR%\syswow64\cmd.exe' /C schtasks /create /tn \drivers /tr %APPDATA%\drivers\drivers.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /tn \drivers /tr %APPDATA%\drivers\drivers.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
- '<SYSTEM32>\taskeng.exe' {5DE15BFD-6125-484B-BED5-5EF3F89227E6} S-1-5-21-1960123792-2022915161-3775307078-1001:gnqisafqzd\user:Interactive:[1]