Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'bjsex' = 'rundll32.exe "%APPDATA%\bjsex.dll",GetChecksum'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\id=BgBgAAEAyY4CAAEFCBcAAAAAAAAAAAAAAAAAAACNDAgUCwAAAF9SqdXhEZvsrLhwgiZvmW94RzVQAABVVVVVVVVVVVVVVVVVVVVVzprNASbc6T_JjgIAVlRRXF5TQlh_Z3d0a2d4anoGAQKrkSInYZO[1]
- %APPDATA%\dloxy.dll
- %APPDATA%\bjsex.dll
- '11#####.#dn141.filesoneetc.com':80
- 11#####.#dn141.filesoneetc.com/file/id=BgBgAAEAyY4CAAEFCBcAAAAAAAAAAAAAAAAAAACNDAgUCwAAAF9SqdXhEZvsrLhwgiZvmW94RzVQAABVVVVVVVVVVVVVVVVVVVVVzprNASbc6T_JjgIAVlRRXF5TQlh_Z3d0a2d4anoGAQKrkSInYZO9YAAAAAAAATRW&rt=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
- DNS ASK 11#####.#dn141.filesoneetc.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: ''