Техническая информация
- regasm.exe
- %TEMP%\ixp000.tmp\davanzale.vsd
- %TEMP%\ixp000.tmp\camminato.vsd
- %TEMP%\ixp000.tmp\saluta.vsd
- %TEMP%\ixp000.tmp\duro.vsd
- %TEMP%\ixp000.tmp\avvelenate.exe.com
- %TEMP%\ixp000.tmp\p
- %TEMP%\ixp000.tmp\regasm.exe
- %TEMP%\ixp000.tmp\p
- %TEMP%\ixp000.tmp\saluta.vsd
- %TEMP%\ixp000.tmp\duro.vsd
- %TEMP%\ixp000.tmp\camminato.vsd
- %TEMP%\ixp000.tmp\davanzale.vsd
- %TEMP%\ixp000.tmp\avvelenate.exe.com
- '13#.#81.123.52':21975
- DNS ASK XY############sCjLNHQFyF.XYhbXveSclyEqMsCjLNHQFyF
- '%TEMP%\ixp000.tmp\avvelenate.exe.com' P
- '%TEMP%\ixp000.tmp\regasm.exe'
- '%WINDIR%\syswow64\dllhost.exe' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c cmd < Duro.vsd (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe'
- '%WINDIR%\syswow64\findstr.exe' /V /R "^LvDSVhyXjXdxKsRHmQvASKarhdehXjwxbouoVnxzwwTxiJmlXpXSysjwrmEElSZZWWXBkJLqcenRQYVERSfNgp$" Davanzale.vsd
- '%WINDIR%\syswow64\ping.exe' localhost