Техническая информация
- <SYSTEM32>\tasks\updates\cugdjysczc
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath "%APPDATA%\cUgDjysCZc.exe"
- %WINDIR%\softwaredistribution\sls\9482f4b4-e343-43b6-b170-9a65bc822c77\sls.cab
- %WINDIR%\softwaredistribution\sls\9482f4b4-e343-43b6-b170-9a65bc822c77\tmp436.tmp
- %WINDIR%\softwaredistribution\sls\855e8a7c-ecb4-4ca3-b045-1dfa50104289\sls.cab
- %WINDIR%\softwaredistribution\sls\855e8a7c-ecb4-4ca3-b045-1dfa50104289\tmp948.tmp
- %APPDATA%\cugdjysczc.exe
- %TEMP%\tmp15da.tmp
- %WINDIR%\softwaredistribution\sls\8b24b027-1dee-babb-9a95-3517dfb9c552\sls.cab
- %WINDIR%\softwaredistribution\sls\8b24b027-1dee-babb-9a95-3517dfb9c552\tmp183d.tmp
- %LOCALAPPDATA%\microsoft\clr_v4.0_32\usagelogs\<Имя файла>.exe.log
- %APPDATA%\2db030ff-16d4-42cb-bc6b-63fdb8a51c17\run.dat
- %APPDATA%\cugdjysczc.exe
- 'el####6.duckdns.org':31789
- DNS ASK settings-win.data.microsoft.com
- DNS ASK el####6.duckdns.org
- DNS ASK mi#####ck321.ddns.net
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\cUgDjysCZc" /XML "%TEMP%\tmp15DA.tmp" (со скрытым окном)
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath "%APPDATA%\cUgDjysCZc.exe" (со скрытым окном)