Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup1' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP001.TMP\"'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKLM>\SYSTEM\ControlSet001\Services\User Privilege Service] 'Start' = '00000002'
- '%WINDIR%\Hacker.com.cn.exe'
- '%TEMP%\IXP001.TMP\BBBBB.exe'
- '%TEMP%\IXP000.TMP\AAAAAA~1.EXE'
- '<SYSTEM32>\ntvdm.exe' -f -i1
- '<SYSTEM32>\svchost.exe'
- <SYSTEM32>\svchost.exe
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP001.TMP\time.bat
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- %TEMP%\IXP001.TMP\BBBBB.exe
- %TEMP%\IXP000.TMP\kav.bat
- %TEMP%\IXP000.TMP\radslog.log
- %TEMP%\IXP000.TMP\ravtask.bat
- %TEMP%\IXP000.TMP\ravmon.bat
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\radslog.log
- %WINDIR%\Temp\scs2.tmp
- %WINDIR%\Temp\scs1.tmp
- 'ha#####field.3322.org':8000
- DNS ASK ha#####field.3322.org
- ClassName: 'ConsoleWindowClass' WindowName: 'ntvdm-bc0.bc4.380001'
- ClassName: 'Shell_TrayWnd' WindowName: ''