Техническая информация
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' "Add-MpPreference -ExclusionPath 'C:\Users\Public\Proxy_Stuff\Silviozas Premium Proxy.exe'"
- <PATH_SAMPLE>.lnk
- %WINDIR%\temp\cab18fc.tmp
- %WINDIR%\temp\tar18fd.tmp
- %WINDIR%\temp\cab1af1.tmp
- %WINDIR%\temp\tar1af2.tmp
- %WINDIR%\temp\cab1b60.tmp
- %WINDIR%\temp\tar1b61.tmp
- %WINDIR%\temp\cab1cf8.tmp
- %WINDIR%\temp\tar1cf9.tmp
- %WINDIR%\temp\cab1e51.tmp
- %WINDIR%\temp\tar1e52.tmp
- %WINDIR%\temp\cab18fc.tmp
- %WINDIR%\temp\tar18fd.tmp
- %WINDIR%\temp\cab1af1.tmp
- %WINDIR%\temp\tar1af2.tmp
- %WINDIR%\temp\cab1b60.tmp
- %WINDIR%\temp\tar1b61.tmp
- %WINDIR%\temp\cab1cf8.tmp
- %WINDIR%\temp\tar1cf9.tmp
- %WINDIR%\temp\cab1e51.tmp
- %WINDIR%\temp\tar1e52.tmp
- из <Полный путь к файлу> в C:\users\public\proxy_stuff\silviozas premium proxy.exe
- 'localhost':49181
- 'localhost':49183
- 'ke##uth.win':443
- 'localhost':49181
- 'localhost':49183
- 'localhost':49184
- 'ke##uth.win':443
- DNS ASK ke##uth.win
- '<SYSTEM32>\cmd.exe' /c color 0A
- '<SYSTEM32>\cmd.exe' /c powershell "Add-MpPreference -ExclusionPath 'C:\Users\Public\Proxy_Stuff\Silviozas Premium Proxy.exe'"
- '<SYSTEM32>\cmd.exe' /c certutil -hashfile "<Полный путь к файлу>" MD5 | find /i /v "md5" | find /i /v "certutil"
- '<SYSTEM32>\certutil.exe' -hashfile "<Полный путь к файлу>" MD5
- '<SYSTEM32>\find.exe' /i /v "md5"
- '<SYSTEM32>\find.exe' /i /v "certutil"