Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Service Host' = '%TEMP%\svhhost.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- '%TEMP%\IXP000.TMP\Setup.exe'
- '%TEMP%\is-2N66F.tmp\is-B9NIN.tmp' /SL4 $50092 "%TEMP%\IXP000.TMP\Setup.exe" 2041794 52224
- '%TEMP%\IXP000.TMP\svchost.exe'
- '%TEMP%\svhhost.exe'
- %TEMP%\svhhost.exe
- %TEMP%\svhhost.dll
- %TEMP%\is-2N66F.tmp\is-B9NIN.tmp
- %TEMP%\is-91KG9.tmp\_isetup\_shfoldr.dll
- %TEMP%\IXP000.TMP\svchost.exe
- %TEMP%\IXP000.TMP\Setup.exe
- %TEMP%\svhhost.exe
- %TEMP%\svhhost.dll
- %TEMP%\svhhost.exe
- %TEMP%\IXP000.TMP\svchost.exe
- 'no###.ath.cx':6667
- DNS ASK no###.ath.cx
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'