Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- '%WINDIR%\Hacker.com.cn.exe'
- '%TEMP%\jhq.exe'
- '%TEMP%\IXP000.TMP\4.exe'
- '%TEMP%\3.exe'
- '%TEMP%\jhq.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\IXP000.TMP\_xiaran.bat" "
- '<SYSTEM32>\cmd.exe' /c %WINDIR%\uninstal.bat
- %WINDIR%\uninstal.bat
- %TEMP%\jhq.exe
- %TEMP%\IXP000.TMP\_xiaran.bat
- %TEMP%\IXP000.TMP\4.exe
- %TEMP%\3.exe
- %WINDIR%\Hacker.com.cn.exe
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\4.exe
- %TEMP%\3.exe
- 'xc##.3322.org':8000
- 'jh#.##crovsoft.com':80
- jh#.##crovsoft.com/pic/up/down/jhq.exe
- DNS ASK xc##.3322.org
- DNS ASK jh#.##crovsoft.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'