Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'smss' = '%PROGRAM_FILES%\Microsoft Window Update\smss.exe'
- '%PROGRAM_FILES%\Microsoft Window Update\smss.exe'
- '%TEMP%\µ·ЅјАОБ§ЕН.EXE'
- '%TEMP%\Server.exe'
- <SYSTEM32>\zlib.dll
- %PROGRAM_FILES%\Microsoft Window Update\smss.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\Server.exe
- %TEMP%\µ·ЅјАОБ§ЕН.EXE
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\~DFECE4.tmp
- 'localhost':1040
- '<IP-адрес в локальной сети>':2277
- 'pd###.egloos.com':80
- 'localhost':1036
- 'up#####ii.tistory.com':80
- pd###.egloos.com/pds/201201/16/97/Mswinsck.ocx
- up#####ii.tistory.com/attachment/cfile23.uf@0141BD435181221D39DCF6.dll
- DNS ASK pd###.egloos.com
- DNS ASK up#####ii.tistory.com
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''