Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XXXXXX6210EE2C' = '%WINDIR%\XXXXXX6210EE2C\svchsot.exe'
- %WINDIR%\Tasks\SA.DAT
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\at.exe 5:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 4:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 3:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 6:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 9:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 8:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 7:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\sc.exe config Schedule start= auto
- <SYSTEM32>\schtasks.exe /delete /tn * /f
- <SYSTEM32>\cmd.exe /c %WINDIR%\XXXXXX6210EE2C\JH.BAT
- <SYSTEM32>\net1.exe start "Task Scheduler"
- <SYSTEM32>\at.exe 2:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 1:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- <SYSTEM32>\at.exe 0:00 %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- %WINDIR%\XXXXXX6210EE2C\JH.BAT
- из <Полный путь к вирусу> в %WINDIR%\XXXXXX6210EE2C\svchsot.exe
- 'localhost':8000
- 'localhost':9003
- 'xi#####g1988.3322.org':9003
- DNS ASK xi#####g1988.3322.org
- ClassName: '' WindowName: '??????????????'