Техническая информация
- %APPDATA%\microsoft\windows\start menu\programs\startup\pnkgwunpqy.url
- %TEMP%\7zipsfx.000\duro.vob
- %TEMP%\7zipsfx.000\pietre.vob
- %TEMP%\7zipsfx.000\vaghe.vob
- %TEMP%\7zipsfx.000\contratte.exe.pif
- %TEMP%\iwvybzaoth\g
- %TEMP%\iwvybzaoth\pnkgwunpqy.exe.pif
- %TEMP%\iwvybzaoth\gayqwzqqeh.js
- %TEMP%\7zipsfx.000\h
- %TEMP%\7zipsfx.000\contratte.exe.pif
- %TEMP%\7zipsfx.000\vaghe.vob в %TEMP%\7zipsfx.000\h
- DNS ASK WV#########MQhCyrPo.WVotimNAyYIMQhCyrPo
- '%TEMP%\7zipsfx.000\contratte.exe.pif' h
- '%WINDIR%\syswow64\cmd.exe' /c cmd < Pietre.vob' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c cmd < Pietre.vob
- '%WINDIR%\syswow64\cmd.exe'
- '%WINDIR%\syswow64\tasklist.exe' /FI "imagename eq BullGuardCore.exe"
- '%WINDIR%\syswow64\find.exe' /I /N "bullguardcore.exe"
- '%WINDIR%\syswow64\tasklist.exe' /FI "imagename eq PSUAService.exe"
- '%WINDIR%\syswow64\find.exe' /I /N "psuaservice.exe"
- '%WINDIR%\syswow64\findstr.exe' /V /R "^vIiVtqKzRvkazkboRthkjKivDHurggrsRvDqzjcIWNoIBqjeIKhVyVYMBKabUHtDzTBWIvOEIFfnBnUCxrcEqokWnRmIUY$" Duro.vob
- '%WINDIR%\syswow64\waitfor.exe' /t 5 CwNihdSjoBnEEDgmwFDpCsiPKveeh
- '%WINDIR%\syswow64\cmd.exe' /c echo [InternetShortcut] > "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\pnkgwunpqy.url" & echo URL="%TEMP%\IWvyBZaoTh\gaYQwzQQeH.js" >> "%APPDATA%\Microsoft\Windows\Start Menu\Pro...