Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winrar' = '%WINDIR%\svchoste.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Warrior' = '%WINDIR%\cscdll.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'msdtcy' = '<SYSTEM32>\msdtcy.exe'
- <SYSTEM32>\msdtcy.exe "<Полный путь к вирусу>"
- [<HKCU>\Software\yahoo\pager]
- C:\svchoste.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\indexc[1].php
- %WINDIR%\cscdll.exe
- C:\cscdll.exe
- <SYSTEM32>\msdtcy.exe
- <SYSTEM32>\msdtcye.exe
- %TEMP%\~DF9D7B.tmp
- 'sa####2.gtphost.com':80
- 'localhost':1036
- sa####2.gtphost.com/indexc.php
- DNS ASK sa####2.gtphost.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''