Техническая информация
- 'r7####.###-cn-beijing.aliyuncs.com':443
- 'r7####.###-cn-beijing.aliyuncs.com':443
- DNS ASK r7####.###-cn-beijing.aliyuncs.com
- '<SYSTEM32>\taskeng.exe' {87E96D5B-5A6A-40B3-AABF-DF390AF5D37F} S-1-5-21-3691498038-2086406363-2140527554-1000:arnejlje\user:Interactive:[1]
- '<SYSTEM32>\cmd.exe' cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%HOMEPATH%\Docu... (со скрытым окном)
- '<SYSTEM32>\schtasks.exe' /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%HOMEPATH%\Documents\" /t REG_DWORD...
- '<SYSTEM32>\cmd.exe' cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%ALLUSERSPROFIL... (со скрытым окном)
- '<SYSTEM32>\schtasks.exe' /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%ALLUSERSPROFILE%\" /t REG_DWORD /d...
- '%HOMEPATH%\documents\ottuty.exe' (со скрытым окном)