Техническая информация
- %WINDIR%\Tasks\xbiwfvh.job
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\<Имя вируса>.exe (загружен из сети Интернет)
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\vbwrtddxf2[1].exe
- <SYSTEM32>\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tmmaelz2[1].uohk
- %TEMP%\tmmaelz2.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\vbwrtddxf2[1].exe
- %TEMP%\tmmaelz2.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tmmaelz2[1].uohk
- 'ma##.##ywordhelper.net':80
- 'localhost':1035
- ma##.##ywordhelper.net/bnbc/keon/vbwrtddxf2.exe
- ma##.##ywordhelper.net/bnbc/cine/tmmaelz2.uohk
- DNS ASK ma##.##ywordhelper.net