Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\ntkrnlpa] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ntkrnlpa] 'ImagePath' = '"%WINDIR%\SysWOW64\ctl3d32\ntkrnlpa.exe"'
- 'ntkrnlpa' "%WINDIR%\SysWOW64\ctl3d32\ntkrnlpa.exe"
- 'ntkrnlpa' %WINDIR%\SysWOW64\ctl3d32\ntkrnlpa.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABUAGYANwBsAGYAXwB2AD0AKAAnAEEAeAAnACsAJwBuAHgAJwArACgAJwAxACcAKwAnAGgAdgAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUATgB2ADoAdQBzAGUAUgBQAHIATw...
- %HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe
- %WINDIR%\syswow64\ctl3d32\ntkrnlpa.exe
- %HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe в %WINDIR%\syswow64\ctl3d32\ntkrnlpa.exe
- '20#.#2.141.45':80
- http://www.re####pctrojan.com/wp-admin/K/
- http://20#.#2.141.45/Rygp5itq8iTQte/XdGFgq05Z53y1/9V4j789q3Y9gPoIx/rH4cpy/5y2Sjyp2xt/
- DNS ASK re####pctrojan.com
- '%HOMEPATH%\hskgro8\vf8y6dj\iax46d69.exe'
- '%WINDIR%\syswow64\ctl3d32\ntkrnlpa.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABUAGYANwBsAGYAXwB2AD0AKAAnAEEAeAAnACsAJwBuAHgAJwArACgAJwAxACcAKwAnAGgAdgAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAGUATgB2ADoAdQBzAGUAUgBQAHIATw...' (со скрытым окном)