Technical Information
- '<SYSTEM32>\taskkill.exe' /F /im <Full path to file>
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- ClassName: 'RegmonClass', WindowName: ''
- nul
- 'localhost':49692
- 'gi##ub.com':443
- 'oc##.#ectigo.com':80
- http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?19##############
- http://oc##.#ectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
- 'localhost':49693
- 'gi##ub.com':443
- DNS ASK gi##ub.com
- DNS ASK oc##.#ectigo.com
- ClassName: 'File Monitor - Sysinternals: www.sysinternals.com' WindowName: ''
- ClassName: 'Process Monitor - Sysinternals: www.sysinternals.com' WindowName: ''
- ClassName: 'Registry Monitor - Sysinternals: www.sysinternals.com' WindowName: ''
- ClassName: '18467-41' WindowName: ''
- ClassName: '' WindowName: ''
- '<SYSTEM32>\cmd.exe' /c wmic csproduct get "UUID"
- '<SYSTEM32>\wbem\wmic.exe' csproduct get "UUID"
- '<SYSTEM32>\cmd.exe' /C ping 1.#.1.1 -n 1 -w 3000 > Nul & taskkill /F /im <Full path to file> & Del /f /q "<Full path to file>"
- '<SYSTEM32>\ping.exe' 1.#.1.1 -n 1 -w 3000