Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%PROGRAM_FILES%\Me application\QvodSetup3.5.exe_464044649D908B54F7EDFE87E8E9FF5053043C3E.exe' = '%PROGRAM_FILES%\Me application\QvodSetup3.5.exe_464044649D908B54F7EDFE87E8E9FF5053043C3E.exe:*:Enabled:QVOD'
- '%PROGRAM_FILES%\Me application\QvodSetup3.5.exe_464044649D908B54F7EDFE87E8E9FF5053043C3E.exe'
- '%TEMP%\zGosbu.exe'
- '%TEMP%\hzJqtmYUliGM.exe' Second 00000AC0 5F6E4CBF <Полный путь к вирусу>
- %TEMP%\nsj3.tmp\inetc.dll
- %PROGRAM_FILES%\Me application\QvodSetup3.5.exe_464044649D908B54F7EDFE87E8E9FF5053043C3E.exe
- %TEMP%\nsj3.tmp\System.dll
- %TEMP%\64AA6F17.tmp
- %TEMP%\nsj3.tmp\FindProcDLL.dll
- %TEMP%\1A18416D.tmp
- %TEMP%\4cbf.tmp
- %TEMP%\zGosbu.exe
- %TEMP%\hzJqtmYUliGM.exe
- %TEMP%\nso2.tmp
- %TEMP%\eHJNbp0588.dat
- %TEMP%\00-00-00-00-00-1.tmp
- %TEMP%\4cbf.tmp
- %TEMP%\1A18416D.tmp
- %TEMP%\64AA6F17.tmp
- %TEMP%\00-00-00-00-00-1.tmp
- %TEMP%\eHJNbp0588.dat
- %TEMP%\hzJqtmYUliGM.exe
- '22#.#94.134.216':80
- 'ck.#ftz.net':999
- '69.##7.18.200':999
- DNS ASK ag###.qvod.com
- DNS ASK ck.#ftz.net
- DNS ASK www.ba##u.com
- DNS ASK dl.#ftz.net
- DNS ASK st##.qvod.com
- DNS ASK tr###.qvod.com
- DNS ASK st####.sipphone.com
- 'tr###.qvod.com':80
- '23#.#55.255.250':1900
- 'st##.qvod.com':3478
- '<IP-адрес в локальной сети>':0
- 'st####.sipphone.com':3478
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'