Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\rtm] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\rtm] 'ImagePath' = '"%WINDIR%\SysWOW64\KBDNO1\rtm.exe"'
- 'rtm' "%WINDIR%\SysWOW64\KBDNO1\rtm.exe"
- 'rtm' %WINDIR%\SysWOW64\KBDNO1\rtm.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABKAEIAUABHAEgAcQBlAGEAPQAnAEsARQBJAEUASwByAHkAYgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYABjAFUAcgBJAFQAeQBwAGAAUgBgAG8AdABPAGAAQwBvAGwAIgAgAD...
- %TEMP%\mlvx.exe
- %WINDIR%\syswow64\kbdno1\rtm.exe
- %TEMP%\mlvx.exe в %WINDIR%\syswow64\kbdno1\rtm.exe
- '71.##.180.213':80
- '18#.#6.148.68':443
- http://si###ations.org/rw_common/ZPdjx/
- http://18#.##.148.68:443/J8LKq9/ via 18#.#6.148.68
- DNS ASK bi#####abatpetani.com
- DNS ASK co####mputers.info
- DNS ASK si###ations.org
- '%TEMP%\mlvx.exe'
- '%WINDIR%\syswow64\kbdno1\rtm.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABKAEIAUABHAEgAcQBlAGEAPQAnAEsARQBJAEUASwByAHkAYgAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYABjAFUAcgBJAFQAeQBwAGAAUgBgAG8AdABPAGAAQwBvAGwAIgAgAD...' (со скрытым окном)