Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'malware' = '<SYSTEM32>\lol.exe'
- <SYSTEM32>\svchost.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\remoteexecution[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\remoteexecution[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\remoteexecution[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\remoteexecution[1]
- 'localhost':1062
- 'localhost':1064
- 'localhost':1060
- 'localhost':1056
- 'localhost':1058
- 'localhost':1072
- 'localhost':1074
- 'localhost':1070
- 'localhost':1066
- 'localhost':1068
- 'localhost':1042
- 'localhost':1044
- 'localhost':1040
- 'localhost':1037
- 'www.re####execution.com':80
- 'localhost':1052
- 'localhost':1054
- 'localhost':1050
- 'localhost':1046
- 'localhost':1048
- www.re####execution.com/
- DNS ASK www.re####execution.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'IEFrame' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''