Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\Suviriooc] 'Start' = '00000002'
- '<SYSTEM32>\Qeeunorzc.exe'
- 'C:\іМРт¶аїЄЖч V2(3).exe'
- '<SYSTEM32>\cmd.exe' /c c:\dusvvbhj.bat
- C:\dusvvbhj.bat
- %TEMP%\_eviip.tmp
- <SYSTEM32>\Qeeunorzc.dll
- %WINDIR%\Fonts\e9a2452bf753055a9c7e499a92e31646.dat
- %TEMP%\BClib\Exmlrpc.fne
- %TEMP%\BClib\krnln.fne
- %TEMP%\BClib\krnln.fnr
- %TEMP%\BClib\dp1.fne
- %TEMP%\nsh2.tmp\System.dll
- %TEMP%\E_4\krnln.fnr
- C:\іМРт¶аїЄЖч V2(3).exe
- C:\іМРт¶аїЄЖч V2(3).rar
- <Текущая директория>\<Имя вируса>.rar
- <SYSTEM32>\Qeeunorzc.exe
- %TEMP%\E_4\Exmlrpc.fne
- %TEMP%\E_4\dp1.fne
- <SYSTEM32>\Qeeunorzc.dll
- <SYSTEM32>\Qeeunorzc.exe
- %TEMP%\nsh2.tmp\System.dll
- 'q5####08.3322.org':19820
- DNS ASK q5####08.3322.org
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''