Техническая информация
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABIADgANwA1AF8ANwBfAF8APQAnAG4ANQAwADgAMAA2ADAAJwA7ACQAcwBfADMANABfADQANAA3ACAAPQAgACcANAA2ACcAOwAkAEIANQAyADAAMgA5ADIAOAA9ACcAcAA0ADEANABfADkAOAAnADsAJABOADAAMgA1ADkAMgAwAD0AJABlAG4AdgA...
- '%CommonProgramFiles%\Microsoft Shared\DW\DW20.EXE' -x -s 1952
- %TEMP%\1224997.cvr
- %HOMEPATH%\46.exe
- %HOMEPATH%\46.exe
- 'fi#####endirecto.com.ar':80
- 'th####plesale.co.uk':80
- 'in##rma.com':80
- 'in##rma.com':443
- 'ta##.#ard-visit.com':80
- 'ta##.#ard-visit.com':443
- http://fi#####endirecto.com.ar/wp-content/YxOBaTgCa/
- http://www.th####plesale.co.uk/rprv/0xsqzs0va_mh2r8-58/
- http://www.in##rma.com/rprv/0xsqzs0va_mh2r8-58/
- http://ta##.#ard-visit.com/eal8/RZnFltETpR/
- 'in##rma.com':443
- 'ta##.#ard-visit.com':443
- DNS ASK pi#####utoricambi.com
- DNS ASK th#####balandaroma.com
- DNS ASK fi#####endirecto.com.ar
- DNS ASK th####plesale.co.uk
- DNS ASK in##rma.com
- DNS ASK ta##.#ard-visit.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABIADgANwA1AF8ANwBfAF8APQAnAG4ANQAwADgAMAA2ADAAJwA7ACQAcwBfADMANABfADQANAA3ACAAPQAgACcANAA2ACcAOwAkAEIANQAyADAAMgA5ADIAOAA9ACcAcAA0ADEANABfADkAOAAnADsAJABOADAAMgA1ADkAMgAwAD0AJABlAG4AdgA...' (со скрытым окном)