Техническая информация
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionPath '%LOCALAPPDATA%\MyApp'"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionProcess '%LOCALAPPDATA%\MyApp\installer.exe'"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionProcess '%LOCALAPPDATA%\MyApp\defendnot.dll'"
- %LOCALAPPDATA%\myapp\installer.exe
- %LOCALAPPDATA%\myapp\defendnot.dll
- 'xa##nak.ru':80
- http://xa##nak.ru/MEGAANM/installer.exe
- http://xa##nak.ru/MEGAANM/defendnot.dll
- DNS ASK xa##nak.ru
- '%LOCALAPPDATA%\myapp\installer.exe' --silent --name exploit.killer
- '<SYSTEM32>\cmd.exe' /c powershell.exe -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionPath '%LOCALAPPDATA%\MyApp'"
- '<SYSTEM32>\cmd.exe' /c powershell.exe -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionProcess '%LOCALAPPDATA%\MyApp\installer.exe'"
- '<SYSTEM32>\cmd.exe' /c powershell.exe -WindowStyle Hidden -NoProfile -Command "Add-MpPreference -ExclusionProcess '%LOCALAPPDATA%\MyApp\defendnot.dll'"
- '<SYSTEM32>\cmd.exe' /c pause