Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{D544C22D-1F70-4B1E-873D-D8DABEB26695}' = ''
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- %TEMP%\123.exe
- %TEMP%\IXP000.TMP\ГАЕ®Нј.exe
- %TEMP%\123.exe (загружен из сети Интернет)
- <SYSTEM32>\cmd.exe /c ""%TEMP%\IXP000.TMP\BT.BAT" "
- 360tray.exe
- ClassName: 'AVP.Tray' WindowName: ''
- ClassName: '____AVP.Root' WindowName: ''
- %TEMP%\IXP000.TMP\BT.BAT
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\google[1].exe
- %TEMP%\123.exe
- %TEMP%\IXP000.TMP\ГАЕ®Нј.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\atmQQ2.dll
- %TEMP%\IXP000.TMP\BT.BAT
- %TEMP%\IXP000.TMP\ГАЕ®Нј.exe
- 'www.ba##u.com':80
- 'localhost':1035
- www.ba##u.com/google.exe
- DNS ASK www.ba##u.com
- ClassName: 'ListBox' WindowName: 'exe_atm'
- ClassName: 'ListBox' WindowName: 'dll_atm'