Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- %WINDIR%\Hacker.com.cn.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Serverl5i7.exe
- %TEMP%\IXP000.TMP\z.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server.exe
- %WINDIR%\Hacker.com.cn.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Serverl5i7.jpg
- %TEMP%\IXP000.TMP\z.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server.jpg
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\z.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Serverl5i7.jpg в %CommonProgramFiles%\Microsoft Shared\MSInfo\Serverl5i7.exe
- %CommonProgramFiles%\Microsoft Shared\MSInfo\Server.jpg в %CommonProgramFiles%\Microsoft Shared\MSInfo\Server.exe
- '44####639.3322.org':8000
- DNS ASK 44####639.3322.org
- ClassName: 'Shell_TrayWnd' WindowName: ''