Техническая информация
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv] 'start' = '00000001'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'ImagePath' = 'globalroot<DRIVERS>\msliksurserv.sys'
- [<HKLM>\SYSTEM\ControlSet001\Services\msliksurserv.sys] 'Start' = '00000001'
- %TEMP%\is-HFHK6.tmp\setup.exe
- %TEMP%\is-G9K3O.tmp\<Имя вируса>.tmp /SL5="$40036,53248,53248,<Полный путь к вирусу>"
- <SYSTEM32>\msiexec.exe /V
- %TEMP%\FR243532.tmp
- <DRIVERS>\msliksurserv.sys
- %TEMP%\is-HFHK6.tmp\setup.exe
- %TEMP%\tmp2.tmp
- %TEMP%\tmp1.tmp
- <SYSTEM32>\msliksurcredo.dll
- %TEMP%\is-HFHK6.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-G9K3O.tmp\<Имя вируса>.tmp
- %TEMP%\is-HFHK6.tmp\_isetup\_shfoldr.dll
- <SYSTEM32>\msliksurdns.dll
- %TEMP%\is-HFHK6.tmp\_isetup\_iscrypt.dll
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
- %TEMP%\is-HFHK6.tmp\setup.exe в %WINDIR%\Temp\tmp3.tmp
- DNS ASK gr###zsqgh.com
- DNS ASK ad###lmobt.com
- DNS ASK cl###kldha.com
- DNS ASK yw###oswdg.com
- DNS ASK ve###japdz.com
- DNS ASK sf###jqrqk.com
- DNS ASK ma###tpsoz.com
- DNS ASK www.microsoft.com
- DNS ASK gf###sacts.com
- DNS ASK ui###umpgc.com
- DNS ASK cb###nmfcf.com
- ClassName: 'Shell_TrayWnd' WindowName: ''