Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKLM>\SYSTEM\ControlSet001\Services\mchInjDrv] 'ImagePath' = '%WINDIR%\TEMP\mc21.tmp'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\Server.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\spoolsv.exe
- %WINDIR%\Explorer.EXE
- <Служебный элемент>
- <SYSTEM32>\cscript.exe
- <SYSTEM32>\alg.exe
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\smss.exe
- System
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\services.exe
- <SYSTEM32>\winlogon.exe
- Библиотека-обработчик для всех процессов: %WINDIR%\MVTRHN.DAT
- %WINDIR%\Hacker.com.cn.exe
- %WINDIR%\Hacker.com.cn.exe
- %WINDIR%\NSNASP.DAT
- %WINDIR%\Temp\mc21.tmp
- %WINDIR%\CTTUKG.DAT
- %WINDIR%\EDFOQH.DAT
- %TEMP%\IXP000.TMP\Server.exe
- %WINDIR%\VVGWYE.DAT
- %WINDIR%\MVTRHN.DAT
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\Server.exe
- %WINDIR%\Temp\mc21.tmp
- 'al####.313434.cn':80
- al####.313434.cn/ip.txt
- DNS ASK al####.313434.cn
- ClassName: 'Shell_TrayWnd' WindowName: ''