Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\is-EJ92N.tmp\QvodSetup3.exe' = '%TEMP%\is-EJ92N.tmp\QvodSetup3.exe:*:Enabled:QVOD'
- '%TEMP%\is-EJ92N.tmp\QvodSetup3.exe' /S
- '%TEMP%\is-6T40A.tmp\<Имя вируса>.tmp' /SL5="$40036,362697,83456,<Полный путь к вирусу>"
- '<SYSTEM32>\ntvdm.exe' -f -i1
- %CommonProgramFiles%\DcomServer\DcomServer.exe
- %TEMP%\is-EJ92N.tmp\QvodSetup3.exe
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- %TEMP%\is-EJ92N.tmp\uxH8Ii2v.dat
- %TEMP%\is-EJ92N.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-6T40A.tmp\<Имя вируса>.tmp
- %TEMP%\is-EJ92N.tmp\dnsdll.dll
- %TEMP%\is-EJ92N.tmp\_isetup\_shfoldr.dll
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- 'aa.#z49.com':21000
- 'ag###.qvod.com':80
- 'up###e.qvod.com':80
- up###e.qvod.com/qd.jpg
- DNS ASK aa.#z49.com
- DNS ASK st##.qvod.com
- DNS ASK ag###.qvod.com
- DNS ASK st####.sipphone.com
- DNS ASK s.####uwotefsmd.com
- DNS ASK up###e.qvod.com
- DNS ASK tr###.qvod.com
- 'st##.qvod.com':3478
- 'tr###.qvod.com':80
- 's.####uwotefsmd.com':8901
- 'st####.sipphone.com':3478
- '23#.#55.255.250':1900
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-b8c.b90.380001'
- ClassName: '(null)' WindowName: '????'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'