Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv] 'start' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'ImagePath' = 'globalroot<DRIVERS>\msliksurserv.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'Start' = '00000001'
- %TEMP%\is-1IOQS.tmp\setup.exe
- %TEMP%\is-2CCAK.tmp\<Имя вируса>.tmp /SL5="$40036,53248,53248,<Полный путь к вирусу>"
- <SYSTEM32>\msiexec.exe /V
- %TEMP%\FR243532.tmp
- <DRIVERS>\msliksurserv.sys
- %TEMP%\is-1IOQS.tmp\setup.exe
- %TEMP%\tmp2.tmp
- %TEMP%\tmp1.tmp
- <SYSTEM32>\msliksurcredo.dll
- %TEMP%\is-1IOQS.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-2CCAK.tmp\<Имя вируса>.tmp
- %TEMP%\is-1IOQS.tmp\_isetup\_shfoldr.dll
- <SYSTEM32>\msliksurdns.dll
- %TEMP%\is-1IOQS.tmp\_isetup\_iscrypt.dll
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
- %TEMP%\is-1IOQS.tmp\setup.exe в %WINDIR%\Temp\tmp3.tmp
- DNS ASK nf###xmbqp.com
- DNS ASK jt###yajrw.com
- DNS ASK wj###lthuw.com
- DNS ASK dc###lywaz.com
- DNS ASK vw###cxelc.com
- DNS ASK pj###vhqtd.com
- DNS ASK zl###hnqzn.com
- DNS ASK www.microsoft.com
- DNS ASK cq###cxriy.com
- DNS ASK tp###ixsyd.com
- DNS ASK dl###gpakm.com
- ClassName: 'Shell_TrayWnd' WindowName: ''