Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv] 'start' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'ImagePath' = 'globalroot<DRIVERS>\msliksurserv.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'Start' = '00000001'
- %TEMP%\is-5LOSQ.tmp\setup.exe
- %TEMP%\is-CK1E6.tmp\<Имя вируса>.tmp /SL5="$30092,53248,53248,<Полный путь к вирусу>"
- <SYSTEM32>\msiexec.exe /V
- %TEMP%\FR243532.tmp
- <DRIVERS>\msliksurserv.sys
- %TEMP%\is-5LOSQ.tmp\setup.exe
- %TEMP%\tmp2.tmp
- %TEMP%\tmp1.tmp
- <SYSTEM32>\msliksurcredo.dll
- %TEMP%\is-5LOSQ.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-CK1E6.tmp\<Имя вируса>.tmp
- %TEMP%\is-5LOSQ.tmp\_isetup\_shfoldr.dll
- <SYSTEM32>\msliksurdns.dll
- %TEMP%\is-5LOSQ.tmp\_isetup\_iscrypt.dll
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
- %TEMP%\is-5LOSQ.tmp\setup.exe в %WINDIR%\Temp\tmp3.tmp
- DNS ASK iu###pakyh.com
- DNS ASK ww###nbpyh.com
- DNS ASK um###qlpum.com
- DNS ASK qx###oxqxr.com
- DNS ASK kl###wqjap.com
- DNS ASK db###gycyl.com
- DNS ASK et###hcvjr.com
- DNS ASK www.microsoft.com
- DNS ASK cs###kgayc.com
- DNS ASK uh###pxyct.com
- DNS ASK vv###fmrkl.com
- ClassName: 'Shell_TrayWnd' WindowName: ''