Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\perfos] 'ImagePath' = '"%WINDIR%\SysWOW64\msyuv\perfos.exe"'
- 'perfos' "%WINDIR%\SysWOW64\msyuv\perfos.exe"
- 'perfos' %WINDIR%\SysWOW64\msyuv\perfos.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAG8AdgBmAHYAMgBuAD0AKAAnAEEAMwAnACsAKAAnAGcAZwAzACcAKwAnADgAdQAnACkAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgBWADoAVABlAG0AUABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\uamrrgt.exe
- %TEMP%\word\2019\uamrrgt.exe в %WINDIR%\syswow64\msyuv\perfos.exe
- '88.##9.181.198':443
- '65.##6.53.186':8080
- '68.##3.233.80':8080
- '18#.#1.158.15':8080
- '37.##7.100.220':7080
- '60.##5.114.64':443
- '20#.#35.10.215':80
- http://in##d.vn/wp-content/BTAvhtA/
- http://65.###.53.186:8080/a0Tth00aZpJBZjXi0l0/JDUT56po745JCbgvzb/YgmPIvverA410ACw/OPj6/ via 65.##6.53.186
- http://68.###.233.80:8080/jTh4NY8YUZM6EkGB/XseTdFFMTYkm/sYB2gGcyweIcOg/3T7IvagXZCS8rG7XgLE/iVkyoqm5gvW/ via 68.##3.233.80
- DNS ASK in##d.vn
- '%TEMP%\word\2019\uamrrgt.exe'
- '%WINDIR%\syswow64\msyuv\perfos.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAG8AdgBmAHYAMgBuAD0AKAAnAEEAMwAnACsAKAAnAGcAZwAzACcAKwAnADgAdQAnACkAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgBWADoAVABlAG0AUABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)