Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'intel(R)corpretion' = 'c:\directory\CyberGate\svchots.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'intel(R)' = 'c:\directory\CyberGate\svchots.exe'
- 'C:\directory\CyberGate\svchots.exe'
- 'C:\directory\CyberGate\svchots.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE'
- %WINDIR%\Explorer.EXE
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %APPDATA%\%USERNAME%log.dat
- C:\directory\CyberGate\svchots.exe
- %TEMP%\%USERNAME%2.txt
- %APPDATA%\%USERNAME%log.dat
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- %TEMP%\%USERNAME%2.txt
- %TEMP%\%USERNAME%7
- %TEMP%\%USERNAME%8
- 'kd##.linkpc.net':81
- 'kd#.#utilities':81
- 'kd#.#ytes.net':81
- 'sh####.linkpc.net':82
- DNS ASK kd##.linkpc.net
- DNS ASK kd#.#utilities
- DNS ASK kd#.#ytes.net
- DNS ASK sh####.linkpc.net
- ClassName: 'Shell_TrayWnd' WindowName: ''