Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Host-process' = '"%WINDIR%Data\hostdl.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Windows Defender' = '"%WINDIR%Data\defender.exe"'
- ClassName: 'OLLYDBG', WindowName: ''
- ClassName: 'GBDYLLO', WindowName: ''
- ClassName: 'pediy06', WindowName: ''
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass', WindowName: ''
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- %TEMP%\Форма.exe
- %TEMP%\Форма.txt
- %WINDIR%Data\History
- %WINDIR%Data\hostdl.exe
- %WINDIR%Data\History
- %WINDIR%Data\hostdl.exe
- %TEMP%\Форма.exe
- 'wp#d':80
- 'ip###ger.com':443
- 'gi##ub.com':443
- http://11#.#11.111.1/wpad.dat via wp#d
- DNS ASK wp#d
- DNS ASK ip###ger.com
- DNS ASK gi##ub.com
- ClassName: '18467-41' WindowName: ''
- '%TEMP%\Форма.exe'
- '%WINDIR%Data\hostdl.exe' "%TEMP%\Форма.exe"
- '<SYSTEM32>\notepad.exe' %TEMP%\Форма.txt