Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'vr763zgham' = '%PROGRAM_FILES%\Local Security Authority Process\lsass.exe'
- '%PROGRAM_FILES%\Local Security Authority Process\lsass.exe'
- 'C:\Microsoft Office 2013.exe'
- 'C:\Server.exe'
- '<SYSTEM32>\net1.exe' start dnscache
- '<SYSTEM32>\attrib.exe' "c:\Server.exe" -h -r -s
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="System Thread" protocol=TCP dir =out action=allow
- '<SYSTEM32>\cmd.exe' /c ""c:\Kill.bat" "
- %PROGRAM_FILES%\Local Security Authority Process\lsass.exe
- C:\Kill.bat
- C:\Server.exe
- C:\Microsoft Office 2013.exe
- %PROGRAM_FILES%\Local Security Authority Process\lsass.exe
- C:\Microsoft Office 2013.exe
- C:\Server.exe
- C:\Server.exe
- %TEMP%\~DFCF9C.tmp
- 'po#.##yalbattle.net':9999
- '12#.#42.126.248':1990
- DNS ASK po#.##yalbattle.net
- ClassName: '(null)' WindowName: 'Microsoft Thread Control'
- ClassName: 'TCPViewClass' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'