Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'System' = '%PROGRAM_FILES%\Microsoft Window Update\System.exe'
- '%PROGRAM_FILES%\Microsoft Window Update\System.exe'
- '%TEMP%\Server.exe'
- <SYSTEM32>\zlib.dll
- %PROGRAM_FILES%\Microsoft Window Update\System.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\Server.exe
- %TEMP%\·№µеАьїл.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\cfile23.uf@0141BD435181221D39DCF6[1].dll
- %TEMP%\~DF9D3.tmp
- 'localhost':1041
- '1.##7.34.25':2277
- 'pd###.egloos.com':80
- 'localhost':1037
- 'up#####ii.tistory.com':80
- pd###.egloos.com/pds/201201/16/97/Mswinsck.ocx
- up#####ii.tistory.com/attachment/cfile23.uf@0141BD435181221D39DCF6.dll
- DNS ASK pd###.egloos.com
- DNS ASK up#####ii.tistory.com
- ClassName: 'TCPViewClass' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''