Техническая информация
- %HOMEPATH%\documents\bcrkmu.exe
- %HOMEPATH%\documents\bcrkmu.exe
- 'yr####.###-cn-beijing.aliyuncs.com':443
- 'yr####.###-cn-beijing.aliyuncs.com':443
- DNS ASK yr####.###-cn-beijing.aliyuncs.com
- '%HOMEPATH%\documents\bcrkmu.exe'
- '<SYSTEM32>\taskeng.exe' {731EB6D9-BDEF-4283-BFFD-A7FB190B1AC5} S-1-5-21-3691498038-2086406363-2140527554-1000:csovze\user:Interactive:[1]
- '<SYSTEM32>\cmd.exe' cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%HOMEPATH%\Docu... (со скрытым окном)
- '<SYSTEM32>\schtasks.exe' /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%HOMEPATH%\Documents\" /t REG_DWORD...
- '%HOMEPATH%\documents\bcrkmu.exe' (со скрытым окном)