Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cbXOGYSm] 'Logon' = 'o'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cbXOGYSm] 'DllName' = 'cbXOGYSm.dll'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{9EBF5C54-224C-48A2-BC86-A5EDA9F8ABF9}' = ''
- %TEMP%\UYRD4E\wuauclt.exe
- %WINDIR%\17PHolmes1044.exe 61A847B5BBF72813329F3C466188719AB689201522886B092CBD44BD8689220221DD3257
- %TEMP%\UYRD4E\XPPID.exe
- %TEMP%\UYRD4E\rundll32.exe
- %WINDIR%\17PHolmes1044.exe (загружен из сети Интернет)
- <SYSTEM32>\cmd.exe /c ""%TEMP%\cq.bat" "
- <SYSTEM32>\cmd.exe /c %TEMP%\removalfile.bat "%TEMP%\UYRD4E\rundll32.exe"
- <SYSTEM32>\winlogon.exe
- %TEMP%\UYRD4E\wuauclt.exe
- %TEMP%\removalfile.bat
- <SYSTEM32>\cbXOGYSm.dll
- %TEMP%\cq.bat
- %WINDIR%\17PHolmes1044.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\17PHolmes[1].cmt
- <SYSTEM32>\awtsQGvu.dll
- %TEMP%\UYRD4E\rundll32.dat
- %TEMP%\UYRD4E\XPPID.exe
- %TEMP%\nsh2.tmp
- %TEMP%\UYRD4E\rundll32.exe
- %TEMP%\nsj3.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\wuauclt.dat
- %TEMP%\UYRD4E\wuauclt.dat
- %TEMP%\nsj3.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\rundll32.dat
- %TEMP%\UYRD4E\rundll32.exe
- %TEMP%\UYRD4E\wuauclt.exe
- 'ks#.###44.wrs.mcboo.com':80
- ks#.###44.wrs.mcboo.com/17PHolmes.cmt
- DNS ASK ks#.###44.wrs.mcboo.com
- ClassName: 'Shell_TrayWnd' WindowName: ''