Техническая информация
- %WINDIR%\Tasks\At16.job
- %WINDIR%\Tasks\At17.job
- %WINDIR%\Tasks\At18.job
- %WINDIR%\Tasks\At13.job
- %WINDIR%\Tasks\At14.job
- %WINDIR%\Tasks\At15.job
- %WINDIR%\Tasks\At22.job
- %WINDIR%\Tasks\At23.job
- %WINDIR%\Tasks\At24.job
- %WINDIR%\Tasks\At19.job
- %WINDIR%\Tasks\At20.job
- %WINDIR%\Tasks\At21.job
- %WINDIR%\Tasks\At4.job
- %WINDIR%\Tasks\At5.job
- %WINDIR%\Tasks\At6.job
- %WINDIR%\Tasks\At1.job
- %WINDIR%\Tasks\At2.job
- %WINDIR%\Tasks\At3.job
- %WINDIR%\Tasks\At10.job
- %WINDIR%\Tasks\At11.job
- %WINDIR%\Tasks\At12.job
- %WINDIR%\Tasks\At7.job
- %WINDIR%\Tasks\At8.job
- %WINDIR%\Tasks\At9.job
- '<SYSTEM32>\net1.exe' start "Task Scheduler"
- из <Полный путь к вирусу> в %WINDIR%\F6154BED\svchsot.exe
- 'localhost':2012
- 'zy####2.f3322.org':2012
- DNS ASK zy####2.f3322.org
- ClassName: '(null)' WindowName: '??????????????'