Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Sys32 Wins' = '"%PROGRAM_FILES%\Microsoft Updates\Sys32 Wins.exe"'
- '%PROGRAM_FILES%\Microsoft Updates\Sys32 Wins.exe'
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="System Thread" protocol=TCP dir =out action=allow
- '<SYSTEM32>\attrib.exe' "<Полный путь к вирусу>" -h -r -s
- '<SYSTEM32>\cmd.exe' /c ""<Текущая директория>\Kill.bat" "
- %PROGRAM_FILES%\Microsoft Updates\Sys32 Wins.exe
- <Текущая директория>\Kill.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cfile23.uf@0141BD435181221D39DCF6[1].dll
- <SYSTEM32>\MSWINSCK.ocx
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- <SYSTEM32>\zlib.dll
- %PROGRAM_FILES%\Microsoft Updates\Sys32 Wins.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\~DF23AF.tmp
- 'localhost':1040
- 'jo####.zapto.org':5850
- 'pd###.egloos.com':80
- 'localhost':1036
- 'up#####ii.tistory.com':80
- pd###.egloos.com/pds/201304/13/62/MSWINSCK.ocx
- up#####ii.tistory.com/attachment/cfile23.uf@0141BD435181221D39DCF6.dll
- DNS ASK jo####.zapto.org
- DNS ASK pd###.egloos.com
- DNS ASK up#####ii.tistory.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'