Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\AudioSrv] 'Start' = '00000002'
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\51e92691.rdb
- <SYSTEM32>\vsbjcwdcsr
- %TEMP%\orlpslbuli.dat
- %WINDIR%\iqwhxgjlso
- <Текущая директория>\ohvytdfvg
- <SYSTEM32>\vsbjcwdcsr
- <SYSTEM32>\config\SysEvent.Evt
- <SYSTEM32>\cmd
- <Текущая директория>\ohvytdfvg
- <SYSTEM32>\config\AppEvent.Evt
- <SYSTEM32>\config\SecEvent.Evt
- <SYSTEM32>\cmd.exe в <SYSTEM32>\cmd
- %TEMP%\orlpslbuli.dat в %ALLUSERSPROFILE%\Application Data\Storm\update\%SESSIONNAME%\seshl.cc3
- из <Полный путь к вирусу> в <Текущая директория>\ST94363.exe
- 'cl####l.eicp.net':9000
- 'fj###.blog.163.com':80
- fj###.blog.163.com/blog/static/221810231201411915757434/
- DNS ASK tr.#.360.cn
- DNS ASK up####h.360safe.com
- DNS ASK w.##0.cn
- DNS ASK st####.360safe.com
- DNS ASK up####.360safe.com
- DNS ASK up#####s.360safe.com
- DNS ASK st##.sd.360.cn
- DNS ASK www.36#.cn
- DNS ASK www.36##afe.com
- DNS ASK so###.##date.360safe.com
- DNS ASK sd#.#60safe.com
- DNS ASK dl.##0safe.com
- DNS ASK dl.##-lb.com
- DNS ASK st##.#60safe.com
- DNS ASK qu#.#.360.cn
- DNS ASK u.###l.f.360.cn
- DNS ASK qu##.f.360.cn
- DNS ASK fj###.blog.163.com
- DNS ASK co##.f.360.cn
- DNS ASK cl####l.eicp.net
- DNS ASK qu##.qh-lb.com
- DNS ASK sd###.360.cn
- DNS ASK qd.##de.360.cn
- DNS ASK qd.###e.qihoo.com
- DNS ASK qu#.#h-lb.com
- DNS ASK sd##.360.cn
- DNS ASK sd##.qh-lb.com