Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%TEMP%\Syslempudlp.exe'
- '%TEMP%\Syslempudlp.exe'
- '<SYSTEM32>\wbem\wmiadap.exe' /R /T
- %TEMP%\4l.dat
- %TEMP%\Syslamwindwsa.exe
- %TEMP%\Syslempudlp.exe
- %TEMP%\lpath.ini
- %TEMP%\2l.dat
- %TEMP%\3l.dat
- %TEMP%\Syslempudlp.exe
- %TEMP%\lpath.ini
- <Полный путь к вирусу>
- %TEMP%\Syslamwindwsa.exe
- %TEMP%\2l.dat
- %TEMP%\3l.dat
- %TEMP%\4l.dat
- <SYSTEM32>\PerfStringBackup.TMP
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
- 'aq.#q.com':80
- 'i2.##etuku.com':80
- aq.#q.com/cn2/unionverify/unionverify_jump?ju#########################
- aq.#q.com/cn2/unionverify/unionverify_jump?ju############################
- i2.##etuku.com/ebdef15df1128b31.png
- i2.##etuku.com/c803e36ebb8d6832.png
- i2.##etuku.com/d77f33568015c894.png
- DNS ASK aq.#q.com
- DNS ASK i2.##etuku.com