Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\byXOiHbC] 'Logon' = 'o'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\byXOiHbC] 'DllName' = 'byXOiHbC.dll'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{F30B1B0B-C305-414E-A4FF-AC93A08DE0AC}' = ''
- %TEMP%\UYRD4E\spoolsv.exe
- %WINDIR%\17PHolmes1044.exe 61A847B5BBF72813329F3C466188719AB689201522886B092CBD44BD8689220221DD3257
- %TEMP%\UYRD4E\SetupCloneCD5312.exe
- %TEMP%\UYRD4E\smss.exe
- %WINDIR%\17PHolmes1044.exe (загружен из сети Интернет)
- <SYSTEM32>\cmd.exe /c ""%TEMP%\cq.bat" "
- <SYSTEM32>\cmd.exe /c %TEMP%\removalfile.bat "%TEMP%\UYRD4E\smss.exe"
- <SYSTEM32>\winlogon.exe
- %TEMP%\UYRD4E\spoolsv.exe
- %TEMP%\removalfile.bat
- <SYSTEM32>\byXOiHbC.dll
- %TEMP%\cq.bat
- %WINDIR%\17PHolmes1044.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\17PHolmes[1].cmt
- %TEMP%\nst4.tmp\InstallHelp.dll
- %TEMP%\UYRD4E\smss.dat
- %TEMP%\UYRD4E\SetupCloneCD5312.exe
- %TEMP%\nsl2.tmp
- %TEMP%\UYRD4E\smss.exe
- %TEMP%\nst3.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\spoolsv.dat
- %TEMP%\UYRD4E\spoolsv.dat
- %TEMP%\nst3.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\smss.dat
- %TEMP%\UYRD4E\smss.exe
- %TEMP%\UYRD4E\spoolsv.exe
- 'ks#.###44.wrs.mcboo.com':80
- ks#.###44.wrs.mcboo.com/17PHolmes.cmt
- DNS ASK ks#.###44.wrs.mcboo.com
- ClassName: 'Shell_TrayWnd' WindowName: ''