Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'secsc' = 'rundll32.exe "%APPDATA%\secsc.dll",SetScissorRect'
- <SYSTEM32>\rundll32.exe "%APPDATA%\secsc.dll",SetScissorRect
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\id=BwBwAAEA_y8CAAEFAAAAAAAAAAAAAAAAAAAAAAAYDAkECwAAAG0VEQThEbT3rLhwgiZvmW-B5EdQAABVVVVVVVVVVVVVVVVVVVVVRorNAZ71cJf_LwIAVlRRXF5TQlh_Z3d0a2d4anoGAQITkSInYZO[1]
- %APPDATA%\ryneys.dll
- %APPDATA%\secsc.dll
- '11#####.##n24.fileshostingbest.com':80
- 11#####.##n24.fileshostingbest.com/file/id=BwBwAAEA_y8CAAEFAAAAAAAAAAAAAAAAAAAAAAAYDAkECwAAAG0VEQThEbT3rLhwgiZvmW-B5EdQAABVVVVVVVVVVVVVVVVVVVVVRorNAZ71cJf_LwIAVlRRXF5TQlh_Z3d0a2d4anoGAQITkSInYZO9YAAAAAAAAAcAAAAHAAAANFYA&rt=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- DNS ASK 11#####.##n24.fileshostingbest.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''