Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'smss' = '%PROGRAM_FILES%\Microsoft Window Update\smss.exe'
- '%PROGRAM_FILES%\Microsoft Window Update\smss.exe'
- '%TEMP%\Server.exe'
- '%TEMP%\New Season 0 Cracked.exe'
- <SYSTEM32>\zlib.dll
- %PROGRAM_FILES%\Microsoft Window Update\smss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\New Season 0 Cracked.exe
- %TEMP%\Server.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- 'localhost':1039
- 'xo####530.codns.com':8080
- 'pd###.egloos.com':80
- 'localhost':1035
- 'up#####ii.tistory.com':80
- pd###.egloos.com/pds/201201/16/97/Mswinsck.ocx
- up#####ii.tistory.com/attachment/cfile23.uf@0141BD435181221D39DCF6.dll
- DNS ASK xo####530.codns.com
- DNS ASK pd###.egloos.com
- DNS ASK up#####ii.tistory.com
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''