Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 ""%TEMP%\IXP000.TMP\""'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- %WINDIR%\Hacker.com.cn.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server_SetupbNTi.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server_Setup.exe
- <SYSTEM32>\cmd.exe /c %WINDIR%\uninstal.bat
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server_SetupbNTi.jpg
- %WINDIR%\uninstal.bat
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\wpad[1].dat
- %TEMP%\IXP000.TMP\1.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server_Setup.jpg
- %WINDIR%\Hacker.com.cn.exe
- %WINDIR%\Hacker.com.cn.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server_Setup.exe
- %TEMP%\IXP000.TMP\1.exe
- 'wpad.localdomain':80
- 'a8####0047.gicp.net':80
- wpad.localdomain/wpad.dat
- a8####0047.gicp.net/ip.txt
- DNS ASK wpad.localdomain
- DNS ASK a8####0047.gicp.net
- ClassName: 'Shell_TrayWnd' WindowName: ''