Техническая информация
- <SYSTEM32>\tasks\winsrc
- winsrc.exe
- %APPDATA%\dllhost.exe
- %APPDATA%\extreme injector v3.exe
- <Текущая директория>\settings.xml
- %APPDATA%\winsrc.exe
- %TEMP%\tmpc87c.tmp.bat
- nul
- %APPDATA%\winsrc.exe
- %APPDATA%\winsrc.exe
- 'ra#.####ubusercontent.com':443
- 'ed#.#dspeck.org':5505
- 'ra#.####ubusercontent.com':443
- DNS ASK ra#.####ubusercontent.com
- DNS ASK ed#.#dspeck.org
- '%APPDATA%\dllhost.exe'
- '%APPDATA%\extreme injector v3.exe'
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '' -Value '"%APPDATA%...
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn "winsrc" /tr '"%APPDATA%\winsrc.exe"' & exit' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn "winsrc" /tr '"%APPDATA%\winsrc.exe"' & exit
- '%WINDIR%\syswow64\schtasks.exe' /create /f /sc onlogon /rl highest /tn "winsrc" /tr '"%APPDATA%\winsrc.exe"'
- '%WINDIR%\syswow64\cmd.exe' /c ""%TEMP%\tmpC87C.tmp.bat""
- '%WINDIR%\syswow64\timeout.exe' 3