Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- %WINDIR%\ghgdh.com.cn.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999xcFV.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999.exe
- %TEMP%\IXP000.TMP\okpp.exe
- %WINDIR%\0.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999.jpg
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999xcFV.jpg
- %WINDIR%\ghgdh.com.cn.exe
- <SYSTEM32>\wbem\Performance\WmiApRpl_new.ini
- %TEMP%\IXP000.TMP\okpp.exe
- %WINDIR%\0.exe
- %WINDIR%\ghgdh.com.cn.exe
- %TEMP%\IXP000.TMP\okpp.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999xcFV.jpg в %CommonProgramFiles%\Microsoft Shared\MSInfo\1999xcFV.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\1999.jpg в %CommonProgramFiles%\Microsoft Shared\MSInfo\1999.exe
- '41###.5f5f.info':80
- 41###.5f5f.info/ip.txt
- DNS ASK 41###.5f5f.info
- ClassName: 'Shell_TrayWnd' WindowName: ''