Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost.exe' = '"<Полный путь к вирусу>"'
- [<HKLM>\SYSTEM\ControlSet001\Services\oreans32] 'Start' = '00000001'
- <SYSTEM32>\reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost.exe /D "\"<Полный путь к вирусу>\"" /f
- <SYSTEM32>\cmd.exe /c ""<Текущая директория>\run.bat" "
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- <Текущая директория>\run.bat
- 'www.1.##lazz.us':80
- www.1.##lazz.us/v7w4q3.php?Tn############################
- DNS ASK www.1.##lazz.us
- '<IP-адрес в локальной сети>':1036
- ClassName: 'Indicator' WindowName: ''
- ClassName: '18467-41' WindowName: ''