Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Svchost Service main' = 'C:\SlayeR Project.exe'
- 'C:\NoBLess's BOX.exe'
- 'C:\SlayeR Project.exe'
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="System Thread" protocol=TCP dir =out action=allow
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\2.tmp\ё¶АОЕ© ЅЗЗа.bat""
- ClassName: 'gdkWindowToplevel' WindowName: '(null)'
- %TEMP%\2.tmp\ё¶АОЕ© ЅЗЗа.bat
- <Текущая директория>\MinecraftSP.jar
- %PROGRAM_FILES%\Microsoft Svchost Service\svchost.exe
- C:\SlayeR Project.exe
- C:\NoBLess's BOX.exe
- %PROGRAM_FILES%\Microsoft Svchost Service\svchost.exe
- 'po#.##yalbattle.net':9999
- 'wl####404.codns.com':1900
- DNS ASK po#.##yalbattle.net
- DNS ASK wl####404.codns.com
- ClassName: 'TnetstatMain' WindowName: '(null)'
- ClassName: 'TfMain' WindowName: '(null)'
- ClassName: '(null)' WindowName: 'ProcNetMonitor - www.SecurityXploded.com'
- ClassName: '(null)' WindowName: 'Windows ?? ???'
- ClassName: '(null)' WindowName: '??? ??'
- ClassName: '(null)' WindowName: 'Process Viewer'
- ClassName: '(null)' WindowName: 'Microsoft Thread Control'
- ClassName: 'TCPViewClass' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'PROCEXPL' WindowName: '(null)'
- ClassName: 'SocketSniff' WindowName: '(null)'
- ClassName: 'ProcessHacker' WindowName: '(null)'