Техническая информация
- <SYSTEM32>\tasks\29ibe
- %HOMEPATH%\documents\mrpc7r.exe
- %HOMEPATH%\documents\vselog.dll
- %HOMEPATH%\documents\wordpadfilter.db
- %HOMEPATH%\documents\msmplist.dat
- <DRIVERS>\189atohci.sys
- %HOMEPATH%\documents\mrpc7r.exe
- %HOMEPATH%\documents\vselog.dll
- %HOMEPATH%\documents\wordpadfilter.db
- %HOMEPATH%\documents\msmplist.dat
- '66####.###-cn-beijing.aliyuncs.com':443
- '66####.###-cn-beijing.aliyuncs.com':443
- DNS ASK 66####.###-cn-beijing.aliyuncs.com
- '%HOMEPATH%\documents\mrpc7r.exe'
- '<SYSTEM32>\taskeng.exe' {E1DE9DD7-C87C-4783-B7CE-82A3DAFF1EF3} S-1-5-21-3691498038-2086406363-2140527554-1000:eeghidwk\user:Interactive:[1]
- '<SYSTEM32>\cmd.exe' cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%ALLUSERSPROFIL... (со скрытым окном)
- '<SYSTEM32>\schtasks.exe' /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%ALLUSERSPROFILE%\" /t REG_DWORD /d...
- '%HOMEPATH%\documents\mrpc7r.exe' (со скрытым окном)