Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\AudioSrv] 'Start' = '00000002'
- %TEMP%\360safe\`DLQ_7714.exe <Полный путь к вирусу> -s<Полный путь к вирусу>
- %PROGRAM_FILES%\360\360sd\360nzp.exe <Полный путь к вирусу> -s<Полный путь к вирусу>
- <SYSTEM32>\cmd.exe /c ""%TEMP%\temp.bat" "
- %TEMP%\sjptkrvimt.dat
- <SYSTEM32>\51e92691.rdb
- <SYSTEM32>\xfgdpkdtad
- %PROGRAM_FILES%\360\360sd\yosfeecnv
- %TEMP%\360safe\`DLQ_7714.exe
- %PROGRAM_FILES%\360\360sd\360nzp.exe
- %TEMP%\temp.bat
- <SYSTEM32>\xfgdpkdtad
- <SYSTEM32>\config\SysEvent.Evt
- %PROGRAM_FILES%\360\360sd\360
- %PROGRAM_FILES%\360\360sd\yosfeecnv
- <SYSTEM32>\config\AppEvent.Evt
- <SYSTEM32>\config\SecEvent.Evt
- %TEMP%\sjptkrvimt.dat в %ALLUSERSPROFILE%\WinRAR\%SESSIONNAME%\mqsfv.xm
- %PROGRAM_FILES%\360\360sd\360nzp.exe в %PROGRAM_FILES%\360\360sd\360
- 'sh####k.3322.org':223
- DNS ASK www.ba##u.com
- DNS ASK sd###.360.cn
- DNS ASK sd##.qh-lb.com
- DNS ASK qd.##de.360.cn
- DNS ASK st##.#60safe.com
- DNS ASK qd.###e.qihoo.com
- DNS ASK www.16#.com
- DNS ASK sd##.360.cn
- DNS ASK qu#.#.360.cn
- DNS ASK sh####k.3322.org
- DNS ASK co##.f.360.cn
- DNS ASK u.###l.f.360.cn
- DNS ASK qu#.#h-lb.com
- DNS ASK qu##.qh-lb.com
- DNS ASK qu##.f.360.cn
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''