Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dvdupgrd] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dvdupgrd] 'ImagePath' = '"%WINDIR%\SysWOW64\msrd3x40\dvdupgrd.exe"'
- 'dvdupgrd' "%WINDIR%\SysWOW64\msrd3x40\dvdupgrd.exe"
- 'dvdupgrd' %WINDIR%\SysWOW64\msrd3x40\dvdupgrd.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABUAGYANwBsAGYAXwB2AD0AKAAnAEEAeAAnACsAJwBuAHgAJwArACgAJwAxACcAKwAnAGgAdgAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUATgB2ADoAdQBzAGUAUgBQAHIATw...
- %HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe
- %WINDIR%\syswow64\msrd3x40\dvdupgrd.exe
- %HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe в %WINDIR%\syswow64\msrd3x40\dvdupgrd.exe
- '20#.#2.141.45':80
- '37.##7.161.206':8080
- '20#.#9.239.162':443
- http://www.re####pctrojan.com/wp-admin/K/
- http://20#.#2.141.45/0iawcFnp/Edbnwfyp/PgTc/
- http://20#.##.239.162:443/yFcYU0qw/Kf0TiJdwFC053Qv/PrdvqahgBqCm/ via 20#.#9.239.162
- DNS ASK re####pctrojan.com
- '%HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe'
- '%WINDIR%\syswow64\msrd3x40\dvdupgrd.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABUAGYANwBsAGYAXwB2AD0AKAAnAEEAeAAnACsAJwBuAHgAJwArACgAJwAxACcAKwAnAGgAdgAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUATgB2ADoAdQBzAGUAUgBQAHIATw...' (со скрытым окном)