Техническая информация
- [<HKLM>\SOFTWARE\Classes\.ghi\shell\open\command] '' = '%PROGRAM_FILES%\lvegned\sysinit.exe'
- %PROGRAM_FILES%\lvegned\scvhost.exe
- %PROGRAM_FILES%\lvegned\sstatic.exe
- %TEMP%\is-A7K4A.tmp\is-UDPP1.tmp /SL4 $30092 "<Полный путь к вирусу>" 81619 52224
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE Explorer\iexplore.exe http://12#.##4.9.120:8022/Insertbz.aspx?mc##############################
- %PROGRAM_FILES%\lvegned\is-J3GMT.tmp
- %PROGRAM_FILES%\lvegned\is-H0VKE.tmp
- %PROGRAM_FILES%\lvegned\is-2BN16.tmp
- %PROGRAM_FILES%\lvegned\unins000.dat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\default[1].html
- %PROGRAM_FILES%\iedw.lnk
- %PROGRAM_FILES%\iedw.ghi
- %TEMP%\is-A23L0.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-A23L0.tmp\_isetup\_RegDLL.tmp
- %TEMP%\is-A7K4A.tmp\is-UDPP1.tmp
- %PROGRAM_FILES%\lvegned\is-JQC77.tmp
- %PROGRAM_FILES%\lvegned\is-A3NPJ.tmp
- %PROGRAM_FILES%\lvegned\is-4PHNB.tmp
- %PROGRAM_FILES%\lvegned\is-7PB3H.tmp
- %TEMP%\is-A7K4A.tmp\is-UDPP1.tmp
- %TEMP%\is-A23L0.tmp\_isetup\_shfoldr.dll
- %TEMP%\is-A23L0.tmp\_isetup\_RegDLL.tmp
- 'localhost':1038
- '12#.#24.9.120':8022
- 'localhost':1036
- 'www.xi###i189.com':80
- www.xi###i189.com/new/dd22/default.html?fr#########
- DNS ASK www.xi###i189.com
- '<IP-адрес в локальной сети>':1037
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''