Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{8fde35c8-4eb2-4a27-8f86-02db4bfb207e}' = 'dqTQLTQL1048.dll'
- '%TEMP%\RarSFX0\loadwg.exe'
- '<SYSTEM32>\dqTQLTQL1048.exe'
- '%TEMP%\RarSFX0\fhzlwg.exe'
- '<SYSTEM32>\attrib.exe' "%TEMP%\RarSFX0\fhzlwg.exe" -r -a -s -h
- '<SYSTEM32>\cmd.exe' /c C:\b3b4f3ed7898166015.bat
- 360tray.exe
- <SYSTEM32>\dqTQLTQL1048.dll
- C:\b3b4f3ed7898166015.bat
- %TEMP%\RarSFX0\intels.cax
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pbwz[1].html
- %TEMP%\RarSFX0\fhzlwg.exe
- %TEMP%\RarSFX0\loadwg.exe
- <SYSTEM32>\dqTQLTQL1048.exe
- <DRIVERS>\XNGAnti.sys
- %TEMP%\RarSFX0\intels.cax
- <DRIVERS>\etc\hosts
- %TEMP%\RarSFX0\fhzlwg.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\pbwz[1].html
- 'po###ng21.cn':80
- po###ng21.cn/pbwz.html
- DNS ASK po###ng21.cn
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'EDIT' WindowName: ''