Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\windowsvnew] 'Start' = '00000002'
- '%PROGRAM_FILES%\whelper\windowsclnew.exe'
- '%PROGRAM_FILES%\whelper\windowsclnew.exe' /install
- '%TEMP%\is-P7E08.tmp\<Имя вируса>.tmp' /SL5="$30092,68386,50688,<Полный путь к вирусу>"
- '<SYSTEM32>\sc.exe' start windowsvnew
- '<SYSTEM32>\sc.exe' delete windowsvnew
- '<SYSTEM32>\sc.exe' stop windowsvnew
- %PROGRAM_FILES%\whelper\is-F2GDV.tmp
- %WINDIR%\runrun.ini
- %TEMP%\is-OTL8T.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-P7E08.tmp\<Имя вируса>.tmp
- %TEMP%\is-OTL8T.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-P7E08.tmp\<Имя вируса>.tmp
- %TEMP%\is-OTL8T.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-OTL8T.tmp\_isetup\_RegDLL.tmp
- %PROGRAM_FILES%\whelper\is-F2GDV.tmp в %PROGRAM_FILES%\whelper\windowsclnew.exe
- 'al#.#qsftp.com':80
- al#.#qsftp.com/?la##############################################################
- DNS ASK al#.#qsftp.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'