Техническая информация
- <SYSTEM32>\tasks\cmd
- <SYSTEM32>\tasks\spoolsv
- <SYSTEM32>\tasks\wininit
- <SYSTEM32>\tasks\services
- <SYSTEM32>\tasks\lsm
- C:\sessiondll\scwuinjmv9l5zfcytenduxe.bat
- %ALLUSERSPROFILE%\sun\java\java update\560854153607923c4c5f107085a7db67be01f252
- %ALLUSERSPROFILE%\sun\java\java update\wininit.exe
- %ALLUSERSPROFILE%\documents\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d
- %ALLUSERSPROFILE%\documents\services.exe
- <SYSTEM32>\c_1144\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4
- <SYSTEM32>\c_1144\spoolsv.exe
- <SYSTEM32>\sud\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d
- C:\msocache\all users\{90140000-00a1-0409-1000-0000000ff1ce}-c\lsm.exe
- <SYSTEM32>\sud\services.exe
- <SYSTEM32>\logoff\wininit.exe
- <SYSTEM32>\w32tm\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4
- <SYSTEM32>\w32tm\spoolsv.exe
- %WINDIR%\syswow64\xmlfilter\ebf1f9fa8afd6d1932bd65bc4cc3af89a4c8e228
- %WINDIR%\syswow64\xmlfilter\cmd.exe
- C:\sessiondll\88ct1uspmasqjqweuh42obmi31dth.vbe
- C:\sessiondll\sessiondlldrivermonitordhcp.exe
- <SYSTEM32>\logoff\560854153607923c4c5f107085a7db67be01f252
- C:\msocache\all users\{90140000-00a1-0409-1000-0000000ff1ce}-c\101b941d020240259ca4912829b53995ad543df6
- 'wa#####nstaff1.fvds.ru':80
- 'ip##fo.io':443
- http://wa#####nstaff1.fvds.ru/javascriptJspollwindows.php?2x#####################################################################################################################################...
- DNS ASK wa#####nstaff1.fvds.ru
- DNS ASK ip##fo.io
- ClassName: 'EDIT' WindowName: ''
- '%WINDIR%\syswow64\wscript.exe' "C:\sessiondll\88Ct1usPMAsqJQwEuH42OBmI31dtH.vbe"
- 'C:\sessiondll\sessiondlldrivermonitordhcp.exe'
- 'C:\msocache\all users\{90140000-00a1-0409-1000-0000000ff1ce}-c\lsm.exe'
- '%WINDIR%\syswow64\cmd.exe' /c ""C:\sessiondll\ScWUinJMv9l5zFCyteNdUxe.bat" "' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c ""C:\sessiondll\ScWUinJMv9l5zFCyteNdUxe.bat" "
- '<SYSTEM32>\schtasks.exe' /create /tn "cmd" /sc ONLOGON /tr "'%WINDIR%\SysWOW64\xmlfilter\cmd.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONLOGON /tr "'<SYSTEM32>\w32tm\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "wininit" /sc ONLOGON /tr "'<SYSTEM32>\logoff\wininit.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONLOGON /tr "'<SYSTEM32>\sud\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "spoolsv" /sc ONLOGON /tr "'<SYSTEM32>\C_1144\spoolsv.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "services" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Documents\services.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "wininit" /sc ONLOGON /tr "'%ALLUSERSPROFILE%\Sun\Java\Java Update\wininit.exe'" /rl HIGHEST /f
- '<SYSTEM32>\schtasks.exe' /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f