Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 ""%TEMP%\IXP000.TMP\""'
- [<HKLM>\SYSTEM\ControlSet001\Services\GrayPigeon_Hacker.com.cn] 'Start' = '00000002'
- %WINDIR%\Hacker.com.cn.exe
- <SYSTEM32>\cmd.exe /c %WINDIR%\uninstal.bat
- %WINDIR%\uninstal.bat
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0J2LM5OP\wpad[1].dat
- %TEMP%\IXP000.TMP\wanxs84.exe
- %WINDIR%\Hacker.com.cn.exe
- %WINDIR%\Hacker.com.cn.exe
- %TEMP%\IXP000.TMP\wanxs84.exe
- 'wpad.localdomain':80
- '18###.5o5o.info':80
- wpad.localdomain/wpad.dat
- 18###.5o5o.info/ip.txt
- DNS ASK wpad.localdomain
- DNS ASK 18###.5o5o.info
- ClassName: 'Shell_TrayWnd' WindowName: ''