Техническая информация
- [<HKLM>\SOFTWARE\Classes\.ghi\shell\open\command] '' = '%PROGRAM_FILES%\lvegned\sysinit.exe'
- %PROGRAM_FILES%\lvegned\scvhost.exe
- %PROGRAM_FILES%\lvegned\sstatic.exe
- %TEMP%\is-KPIKA.tmp\is-AG836.tmp /SL4 $40036 "<Полный путь к вирусу>" 81723 52224
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE Explorer\iexplore.exe http://12#.##4.9.120:8022/Insertbz.aspx?mc##############################
- %PROGRAM_FILES%\lvegned\is-2ICEH.tmp
- %PROGRAM_FILES%\lvegned\is-H7A7V.tmp
- %PROGRAM_FILES%\lvegned\is-7U6V3.tmp
- %PROGRAM_FILES%\iedw.lnk
- %PROGRAM_FILES%\iedw.ghi
- %PROGRAM_FILES%\lvegned\unins000.dat
- %PROGRAM_FILES%\lvegned\is-ANTNV.tmp
- %TEMP%\is-SM8F7.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-SM8F7.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-KPIKA.tmp\is-AG836.tmp
- %PROGRAM_FILES%\lvegned\is-B597D.tmp
- %PROGRAM_FILES%\lvegned\is-N37F5.tmp
- %PROGRAM_FILES%\lvegned\is-BJHGB.tmp
- %TEMP%\is-KPIKA.tmp\is-AG836.tmp
- %TEMP%\is-SM8F7.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-SM8F7.tmp\_isetup\_RegDLL.tmp
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''