Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XXXXXX4BA10D45' = '%WINDIR%\XXXXXX4BA10D45\svchsot.exe'
- %WINDIR%\Tasks\At2.job
- %WINDIR%\Tasks\At1.job
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\at.exe 0:00 %WINDIR%\XXXXXX4BA10D45\svchsot.exe
- <SYSTEM32>\at.exe 1:00 %WINDIR%\XXXXXX4BA10D45\svchsot.exe
- <SYSTEM32>\at.exe 2:00 %WINDIR%\XXXXXX4BA10D45\svchsot.exe
- <SYSTEM32>\net1.exe start "Task Scheduler"
- <SYSTEM32>\cmd.exe /c %WINDIR%\XXXXXX4BA10D45\JH.BAT
- <SYSTEM32>\schtasks.exe /delete /tn * /f
- <SYSTEM32>\sc.exe config Schedule start= auto
- %WINDIR%\XXXXXX4BA10D45\JH.BAT
- %TEMP%\SE1.tmp
- %TEMP%\SE1.tmp
- из <Полный путь к вирусу> в %WINDIR%\XXXXXX4BA10D45\svchsot.exe
- 'gy####21.3322.org':8000
- 'gg####521.3322.org':8000
- DNS ASK gy####21.3322.org
- DNS ASK gg####521.3322.org
- '<IP-адрес в локальной сети>':1035
- ClassName: '' WindowName: '??????????????'