Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\driverquery] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\driverquery] 'ImagePath' = '"%WINDIR%\SysWOW64\driverquery\driverquery.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAHYAYwB3AG8AYQBmAGgAYQB4AGUAPQAnAEIAZwBhAG4AawBjAHkAbwBkAHkAegBpAHAAJwA7ACQAUQBvAG0AegBhAHoAbwB1AGEAIAA9ACAAJwAzADMANwAnADsAJABFAGoAbQBhAGIAbABoAHAAaQB2AGcAPQAnAFIAawBtAGMAcQB5AHQAegBiAG...
- %HOMEPATH%\337.exe
- %HOMEPATH%\337.exe в %WINDIR%\syswow64\driverquery\driverquery.exe
- '17#.#21.229.86':80
- '18#.#90.47.173':80
- '91.##6.4.234':443
- http://fe###nent.com/wp/UqU/
- http://18#.#90.47.173/5AyhJA9W4qNj/AE01mEr1N0QF3VIHQl/0OHyPoGUw6/
- http://91.###.4.234:443/0KZwRUwDJuOT5/s09tG6G/XMrkOO/DebcUpOm/CmEROx/mgMM/ via 91.##6.4.234
- DNS ASK fe###nent.com
- '%HOMEPATH%\337.exe'
- '%WINDIR%\syswow64\driverquery\driverquery.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAHYAYwB3AG8AYQBmAGgAYQB4AGUAPQAnAEIAZwBhAG4AawBjAHkAbwBkAHkAegBpAHAAJwA7ACQAUQBvAG0AegBhAHoAbwB1AGEAIAA9ACAAJwAzADMANwAnADsAJABFAGoAbQBhAGIAbABoAHAAaQB2AGcAPQAnAFIAawBtAGMAcQB5AHQAegBiAG...' (со скрытым окном)