Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '719A8517' = '%WINDIR%\719A8517\svchsot.exe'
- %WINDIR%\Tasks\At16.job
- %WINDIR%\Tasks\At17.job
- %WINDIR%\Tasks\At18.job
- %WINDIR%\Tasks\At13.job
- %WINDIR%\Tasks\At14.job
- %WINDIR%\Tasks\At15.job
- %WINDIR%\Tasks\At22.job
- %WINDIR%\Tasks\At23.job
- %WINDIR%\Tasks\At24.job
- %WINDIR%\Tasks\At19.job
- %WINDIR%\Tasks\At20.job
- %WINDIR%\Tasks\At21.job
- %WINDIR%\Tasks\At4.job
- %WINDIR%\Tasks\At5.job
- %WINDIR%\Tasks\At6.job
- %WINDIR%\Tasks\At1.job
- %WINDIR%\Tasks\At2.job
- %WINDIR%\Tasks\At3.job
- %WINDIR%\Tasks\At10.job
- %WINDIR%\Tasks\At11.job
- %WINDIR%\Tasks\At12.job
- %WINDIR%\Tasks\At7.job
- %WINDIR%\Tasks\At8.job
- %WINDIR%\Tasks\At9.job
- <SYSTEM32>\net1.exe start "Task Scheduler"
- из <Полный путь к вирусу> в %WINDIR%\719A8517\svchsot.exe
- 'localhost':2012
- 'ji#####1616.3322.org':2012
- DNS ASK ji#####1616.3322.org
- ClassName: '' WindowName: '??????????????'