Техническая информация
- [<HKLM>\SOFTWARE\Classes\.ghi\shell\open\command] '' = '%PROGRAM_FILES%\lvegned\sysinit.exe'
- %PROGRAM_FILES%\lvegned\scvhost.exe
- %PROGRAM_FILES%\lvegned\sstatic.exe
- %TEMP%\is-62CEJ.tmp\is-QO6UU.tmp /SL4 $30092 "<Полный путь к вирусу>" 81378 52224
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE Explorer\iexplore.exe http://12#.##4.9.120:8022/Insertbz.aspx?mc##############################
- %PROGRAM_FILES%\lvegned\is-8M6QU.tmp
- %PROGRAM_FILES%\lvegned\is-BJIFR.tmp
- %PROGRAM_FILES%\lvegned\is-UAM0F.tmp
- %PROGRAM_FILES%\iedw.lnk
- %PROGRAM_FILES%\iedw.ghi
- %PROGRAM_FILES%\lvegned\unins000.dat
- %PROGRAM_FILES%\lvegned\is-MB0S2.tmp
- %TEMP%\is-OHSJK.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-OHSJK.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-62CEJ.tmp\is-QO6UU.tmp
- %PROGRAM_FILES%\lvegned\is-U7LCQ.tmp
- %PROGRAM_FILES%\lvegned\is-KH1V7.tmp
- %PROGRAM_FILES%\lvegned\is-9TG3B.tmp
- %TEMP%\is-62CEJ.tmp\is-QO6UU.tmp
- %TEMP%\is-OHSJK.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-OHSJK.tmp\_isetup\_RegDLL.tmp
- '12#.#24.9.120':8022
- 'localhost':1036
- 'localhost':1035
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''