Техническая информация
- rugs.exe.pif
- %TEMP%\ixp000.tmp\battlefield.mil
- %TEMP%\ixp000.tmp\breaks.mil
- %TEMP%\ixp000.tmp\roots.mil
- %TEMP%\ixp000.tmp\rugs.exe.pif
- %TEMP%\ixp000.tmp\ahvmazyfnurzo.dll
- %TEMP%\ixp000.tmp\f
- %TEMP%\ixp000.tmp\battlefield.mil
- %TEMP%\ixp000.tmp\rugs.exe.pif
- %TEMP%\ixp000.tmp\roots.mil в %TEMP%\ixp000.tmp\f
- DNS ASK qt#########eEQgAbHa.qtwjKMLftlCeEQgAbHa
- '%TEMP%\ixp000.tmp\rugs.exe.pif' f
- '%WINDIR%\syswow64\cmd.exe' /c cmd < Breaks.mil & ping -n 5 localhost' (со скрытым окном)
- '%WINDIR%\syswow64\choice.exe' 3489834785637788484436574374756367847583' (со скрытым окном)
- '%WINDIR%\syswow64\choice.exe' 3489834785637788484436574374756367847583
- '%WINDIR%\syswow64\cmd.exe' /c cmd < Breaks.mil & ping -n 5 localhost
- '%WINDIR%\syswow64\cmd.exe'
- '%WINDIR%\syswow64\tasklist.exe' /FI "imagename eq AvastUI.exe"
- '%WINDIR%\syswow64\find.exe' /I /N "avastui.exe"
- '%WINDIR%\syswow64\tasklist.exe' /FI "imagename eq AVGUI.exe"
- '%WINDIR%\syswow64\find.exe' /I /N "avgui.exe"
- '%WINDIR%\syswow64\findstr.exe' /V /R "^toLyftxzuSdNZ$" Battlefield.mil
- '%WINDIR%\syswow64\ping.exe' localhost -n 5
- '%WINDIR%\syswow64\ping.exe' -n 5 localhost