Техническая информация
- [<HKLM>\Software\Classes\b00_auto_file\shell\open\command] '' = 'c:\bin\winzoom.exe "%1"'
- C:\zoomtmp.txt
- C:\bin\winzoom_debug_log_2020-02.txt
- C:\bin\mictrace.txt
- %WINDIR%\<Имя файла>.ini
- C:\bin\mictrace.txt
- DNS ASK EL###############################TQODELTS63TSTQSTQTRT.TEPPINGTS2TMCTSTQGTQENUINETQITQNTRELTKC2.J840130.K0.ZOOMPHYSIO.MOOO.COM
- DNS ASK DK##.##.#####.##.###QERVICETSTQPTQACKTS1.D2.J840130.K0.ZOOMP.CRABDANCE.COM
- DNS ASK CH##########.##.##0.T.T0.T.T51.T.T32.J840130.K0.ZOOMP.CRABDANCE.COM
- DNS ASK BE######.#.#840130.K0.ZOOMP.CRABDANCE.COM
- DNS ASK AB######.##000.K255.ZOOM.PHYSIOL.UMU.SE
- DNS ASK 70.##.#1.2.in-addr.arpa
- DNS ASK 22#.###.#39.193.in-addr.arpa
- DNS ASK 76.##.##.31.in-addr.arpa
- DNS ASK 94.##.##.81.in-addr.arpa
- DNS ASK 25#.###.211.95.in-addr.arpa
- DNS ASK 1.##.#.10.in-addr.arpa
- DNS ASK microsoft.com
- DNS ASK ZE##########.####SER.XTQWAYBHFP.J840130.K0.ZOOMPHYSIO.MOOO.COM
- DNS ASK WE##########.J840130.K0.ZOOM.PHYSIOL.UMU.SE
- DNS ASK RH#.#.#####30.K0.ZOOM.SPECIALCARS.SE
- DNS ASK EL###############################TQODELTS63TSTQSTQTRT.TEPPINGTS2TMCTSTQGTQENUINETQITQNTRELTKC2.J840130.K0.ZOOMP.CRABDANCE.COM
- DNS ASK FE#.######0.K0.ZOOMP.CRABDANCE.COM
- DNS ASK GL###############################TQODELTS63TSTQSTQTRT.TEPPINGTS2TMCTSTQGTQENUINETQITQNTRELTKC2.J840130.K0.ZOOMP.CRABDANCE.COM
- '%WINDIR%\syswow64\cmd.exe' /c tracert -d -h 9 www.microsoft.com > c:\bin\mictrace.txt
- '%WINDIR%\syswow64\tracert.exe' -d -h 9 www.microsoft.com