Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'BWHRQO' = '"%APPDATA%\Windata\PKLRTG.exe"'
- %APPDATA%\microsoft\windows\start menu\programs\startup\bwhrqo.lnk
- <SYSTEM32>\tasks\bwhrqo.exe
- %APPDATA%\windata\pklrtg.exe
- %TEMP%\bwhrqo.vbs
- 'we#########ed888.securitytactics.com':4002
- 'we#########ed888.securitytactics.com':4002
- DNS ASK we#########ed888.securitytactics.com
- '%WINDIR%\syswow64\wscript.exe' %TEMP%\BWHRQO.vbs
- '%APPDATA%\windata\pklrtg.exe'
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /tn BWHRQO.exe /tr %APPDATA%\Windata\PKLRTG.exe /sc minute /mo 1' (со скрытым окном)
- '%APPDATA%\windata\pklrtg.exe' ' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /tn BWHRQO.exe /tr %APPDATA%\Windata\PKLRTG.exe /sc minute /mo 1
- '%WINDIR%\syswow64\schtasks.exe' /create /tn BWHRQO.exe /tr %APPDATA%\Windata\PKLRTG.exe /sc minute /mo 1
- '<SYSTEM32>\taskeng.exe' {CF92E86E-4A79-4D8E-8217-7154E1145546} S-1-5-21-1960123792-2022915161-3775307078-1001:eymlsafzt\user:Interactive:[1]