Техническая информация
- %WINDIR%\Tasks\zmuqiza.job
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\<Имя вируса>.exe (загружен из сети Интернет)
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tyergdfhc2b[1].exe
- <SYSTEM32>\<Имя вируса>.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ntirhwkd2[1].uohk
- %TEMP%\ntirhwkd2.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\tyergdfhc2b[1].exe
- %TEMP%\ntirhwkd2.uohk
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\ntirhwkd2[1].uohk
- 'ma##.##ywordhelper.net':80
- 'localhost':1037
- ma##.##ywordhelper.net/bnbc/keon/tyergdfhc2b.exe
- ma##.##ywordhelper.net/bnbc/cine/ntirhwkd2.uohk
- DNS ASK ma##.##ywordhelper.net