Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\windowsscl] 'Start' = '00000002'
- '%PROGRAM_FILES%\whelper\windowsscl.exe'
- '%PROGRAM_FILES%\whelper\windowsscl.exe' /install
- '%TEMP%\is-98LO0.tmp\<Имя вируса>.tmp' /SL5="$30092,120378,54272,<Полный путь к вирусу>"
- '<SYSTEM32>\sc.exe' start windowsscl
- '<SYSTEM32>\sc.exe' delete windowsscl
- '<SYSTEM32>\sc.exe' stop windowsscl
- %PROGRAM_FILES%\whelper\is-GD72S.tmp
- %WINDIR%\runrun.ini
- %TEMP%\is-IEPR3.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-98LO0.tmp\<Имя вируса>.tmp
- %TEMP%\is-IEPR3.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-98LO0.tmp\<Имя вируса>.tmp
- %TEMP%\is-IEPR3.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-IEPR3.tmp\_isetup\_RegDLL.tmp
- %PROGRAM_FILES%\whelper\is-GD72S.tmp в %PROGRAM_FILES%\whelper\windowsscl.exe
- 'tw.##rqqs.com':80
- tw.##rqqs.com/?la##############################################################
- DNS ASK tw.##rqqs.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'