Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv] 'start' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'ImagePath' = 'globalroot<DRIVERS>\msliksurserv.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'Start' = '00000001'
- %TEMP%\is-Q7869.tmp\setup.exe
- %TEMP%\is-EK0R2.tmp\<Имя вируса>.tmp /SL5="$40036,53248,53248,<Полный путь к вирусу>"
- <SYSTEM32>\msiexec.exe /V
- %TEMP%\FR243532.tmp
- <DRIVERS>\msliksurserv.sys
- %TEMP%\is-Q7869.tmp\setup.exe
- %TEMP%\tmp2.tmp
- %TEMP%\tmp1.tmp
- <SYSTEM32>\msliksurcredo.dll
- %TEMP%\is-Q7869.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-EK0R2.tmp\<Имя вируса>.tmp
- %TEMP%\is-Q7869.tmp\_isetup\_shfoldr.dll
- <SYSTEM32>\msliksurdns.dll
- %TEMP%\is-Q7869.tmp\_isetup\_iscrypt.dll
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
- DNS ASK kl###sslas.com
- DNS ASK lf###unsrm.com
- DNS ASK kt###bkdeo.com
- DNS ASK tq###effvc.com
- DNS ASK or###bactd.com
- DNS ASK qm###dshpu.com
- DNS ASK tu###ishes.com
- DNS ASK www.microsoft.com
- DNS ASK sz###raaie.com
- DNS ASK fz###bbnnb.com
- DNS ASK ht###yzdbs.com
- ClassName: 'Shell_TrayWnd' WindowName: ''