Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\hgGyayay] 'Logon' = 'o'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\hgGyayay] 'DllName' = 'hgGyayay.dll'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{6C23AB0C-0244-4B01-8253-BEE724D0D2EC}' = ''
- %TEMP%\UYRD4E\trvp.exe
- %WINDIR%\17PHolmes1044.exe 61A847B5BBF72813329F3C466188719AB689201522886B092CBD44BD8689220221DD3257
- %TEMP%\UYRD4E\Activation.exe
- %TEMP%\UYRD4E\qpfu.exe
- %WINDIR%\17PHolmes1044.exe (загружен из сети Интернет)
- <SYSTEM32>\cmd.exe /c ""%TEMP%\un.bat" "
- <SYSTEM32>\cmd.exe /c %TEMP%\removalfile.bat "%TEMP%\UYRD4E\qpfu.exe"
- <SYSTEM32>\winlogon.exe
- %TEMP%\UYRD4E\trvp.exe
- %TEMP%\removalfile.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\17PHolmes[1].cmt
- %TEMP%\un.bat
- %WINDIR%\17PHolmes1044.exe
- <SYSTEM32>\hgGyayay.dll
- %TEMP%\UYRD4E\qpfu.dat
- %TEMP%\UYRD4E\Activation.exe
- %TEMP%\UYRD4E\trvp.dat
- %TEMP%\UYRD4E\qpfu.exe
- %TEMP%\nsw2.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\trvp.dat
- %TEMP%\nsw2.tmp\DcryptDll.dll
- %TEMP%\UYRD4E\qpfu.dat
- %TEMP%\UYRD4E\qpfu.exe
- %TEMP%\UYRD4E\trvp.exe
- 'ym#.###44.wrs.mcboo.com':80
- ym#.###44.wrs.mcboo.com/17PHolmes.cmt
- DNS ASK ym#.###44.wrs.mcboo.com
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'EDIT' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''