Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defender' = '"%APPDATA%\Microsoft\Windows Defender\defender.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Host-process' = '"%APPDATA%\Microsoft\Network\Connections\hostdl.exe"'
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass', WindowName: ''
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'GBDYLLO', WindowName: ''
- ClassName: 'OLLYDBG', WindowName: ''
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: 'pediy06', WindowName: ''
- %APPDATA%\Microsoft\Internet Explorer\History
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %TEMP%\GH_RU_EU_NA_VN__12.01.2018_.exe
- %TEMP%\TayzleNew.exe
- %APPDATA%\Microsoft\Network\Connections\hostdl.exe
- %APPDATA%\Microsoft\Internet Explorer\History
- %TEMP%\TayzleNew.exe
- 'ip###ger.com':443
- 'wp#d':80
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK ip###ger.com
- DNS ASK wp#d
- ClassName: '18467-41' WindowName: ''
- '%APPDATA%\Microsoft\Network\Connections\hostdl.exe' "%TEMP%\TayzleNew.exe"
- '%TEMP%\TayzleNew.exe'