Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Update' = '"%WINDIR%\svchost.exe" ..'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'Windows Update' = '"%WINDIR%\svchost.exe" ..'
- %APPDATA%\microsoft\windows\start menu\programs\startup\java update.exe
- <SYSTEM32>\tasks\server
- %TEMP%\injector.exe
- %TEMP%\extreme injector .exe
- %WINDIR%\svchost.exe
- <Текущая директория>\settings.xml
- %TEMP%\server.exe
- %WINDIR%\svchost.exe
- 'ra#.####ubusercontent.com':443
- 'co#######-price.at.playit.gg':13712
- 'ra#.####ubusercontent.com':443
- 'co#######-price.at.playit.gg':13712
- DNS ASK ra#.####ubusercontent.com
- DNS ASK co#######-price.at.playit.gg
- '%TEMP%\injector.exe'
- '%TEMP%\extreme injector .exe'
- '%WINDIR%\svchost.exe'
- '%TEMP%\server.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn Server /tr %LOCALAPPDATA%\Temp/Server.exe' (со скрытым окном)
- '%TEMP%\server.exe' ' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn Server /tr %LOCALAPPDATA%\Temp/Server.exe
- '<SYSTEM32>\taskeng.exe' {88762DC4-5A95-4345-B5BD-0080A394C55A} S-1-5-21-1960123792-2022915161-3775307078-1001:efvdjcyamhk\user:Interactive:[1]