Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\scrobj] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\scrobj] 'ImagePath' = '"%WINDIR%\SysWOW64\kernel32\scrobj.exe"'
- 'scrobj' "%WINDIR%\SysWOW64\kernel32\scrobj.exe"
- 'scrobj' %WINDIR%\SysWOW64\kernel32\scrobj.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPAE8AVgBBAEsAZQB5AHAAPQAnAFoAVgBVAEEARwBnAHEAYQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGUAQwBVAFIASQBUAHkAYABwAHIAYABvAHQAbwBDAG8AbAAiACAAPQAgAC...
- %HOMEPATH%\320.exe
- %WINDIR%\syswow64\kernel32\scrobj.exe
- %HOMEPATH%\320.exe в %WINDIR%\syswow64\kernel32\scrobj.exe
- '24.##9.135.121':80
- http://ic###yte.com/uPD6c443/
- http://ib###oods.com/site/UHaa7627/
- http://24.##9.135.121/2dgNlbI1dKP/uKKlC/dNIalS92Q3f7g/AxB72AhfvoYFnqqlfy/
- DNS ASK ic###yte.com
- DNS ASK ib###oods.com
- '%HOMEPATH%\320.exe'
- '%WINDIR%\syswow64\kernel32\scrobj.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPAE8AVgBBAEsAZQB5AHAAPQAnAFoAVgBVAEEARwBnAHEAYQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGUAQwBVAFIASQBUAHkAYABwAHIAYABvAHQAbwBDAG8AbAAiACAAPQAgAC...' (со скрытым окном)