Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] '*-1073304700' = '"%WINDIR%\-1073304700\acrotray.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] '*-1073304700' = '"%WINDIR%\-1073304700\acrotray.exe"'
- скрытых файлов
- %HOMEPATH%\AppServices.exe
- <SYSTEM32>\schtasks.exe /CREATE /SC ONLOGON /TN A-1073304700 /TR %WINDIR%\-1073304700\acrotray.exe /RL HIGHEST
- <SYSTEM32>\cmd.exe /c ""%TEMP%\I-1073304700.bat" "
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
- %TEMP%\I-1073304700.bat
- %HOMEPATH%\AppServices.exe
- %HOMEPATH%\AppServices.exe
- из <Полный путь к вирусу> в %WINDIR%\-1073304700\acrotray.exe
- DNS ASK an##m.info
- ClassName: '#32770' WindowName: 'Windows Task Manager'