Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'Explorer.exe <SYSTEM32>\Ransomware.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\URL[1].txt
- %TEMP%\oOowwLVj.txt
- <SYSTEM32>\Ransomware.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Gate[1].php
- <SYSTEM32>\Ransomware.exe
- 'ra####ware.x-st.org':80
- 'localhost':1036
- ra####ware.x-st.org/URL.txt
- ra####ware.x-st.org/Gate.php?Ac##############
- DNS ASK ra####ware.x-st.org
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'