Техническая информация
- %WINDIR%\Tasks\wjwcziz.job
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\<Имя вируса>.exe (загружен из сети Интернет)
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\vbwrtddxf1[1].exe
- <SYSTEM32>\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tmmaelz1[1].uohk
- %TEMP%\tmmaelz1.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\vbwrtddxf1[1].exe
- %TEMP%\tmmaelz1.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tmmaelz1[1].uohk
- 'ma##.##ywordhelper.net':80
- 'localhost':1037
- ma##.##ywordhelper.net/bnbc/keon/vbwrtddxf1.exe
- ma##.##ywordhelper.net/bnbc/cine/tmmaelz1.uohk
- DNS ASK ma##.##ywordhelper.net