Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 ""%TEMP%\IXP000.TMP\""'
- [<HKLM>\SYSTEM\ControlSet001\Services\MTGHKjrq] 'Start' = '00000002'
- <SYSTEM32>\svchost.exe -k netsvcs
- <SYSTEM32>\taskkill.exe /f /t /im ZhuDongFangYu.exe
- %WINDIR%\FuckYou.reg
- %TEMP%\wi123015nd.temp
- %WINDIR%\FuckYou.txt
- %TEMP%\IXP000.TMP\Output.exe
- %WINDIR%\MyInformations.ini
- %WINDIR%\FuckYou.reg
- %WINDIR%\MyInformations.ini
- %TEMP%\IXP000.TMP\Output.exe
- %WINDIR%\FuckYou.txt
- 'ji#####njiege.3322.org':801
- DNS ASK ji#####njiege.3322.org
- 'localhost':1050
- 'localhost':1051
- 'localhost':1049
- 'localhost':1047
- 'localhost':1048
- 'localhost':1052
- 'localhost':1056
- 'localhost':1057
- 'localhost':1055
- 'localhost':1053
- 'localhost':1054
- 'localhost':1039
- 'localhost':1040
- 'localhost':1038
- '23#.#55.255.250':1900
- 'localhost':1037
- 'localhost':1041
- 'localhost':1045
- 'localhost':1046
- 'localhost':1044
- 'localhost':1042
- 'localhost':1043
- ClassName: '' WindowName: ''