


HKEY_LOCAL_MACHINE>system>cURRENTcONTROLsET>sERVICES>360svc In the left panel, double-click the following:.Click Start>Run, type REGEDIT, then press Enter. To delete the registry key this malware/grayware created: In HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MediaResources.In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options.In HKEY_LOCAL_MACHINE\system\cURRENTcONTROLsET\sERVICES\360svc.Else, check this Microsoft article first before modifying your computer's registry. Please do this step only if you know how or you can ask assistance from your system administrator.
#ALYAC DOWNLOAD ENGLISH VERSION WINDOWS#
Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction.


This Trojan connects to the following possibly malicious URL: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.) (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\\Local Settings\Temp on Windows 2000, XP, and Server 2003. HKEY_LOCAL_MACHINE\system\cURRENTcONTROLsET\ This Trojan registers as a system service to ensure its automatic execution at every system startup by adding the following registry keys: (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) This Trojan creates the following folders: This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
