Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\qoMghgHw] 'Logon' = 'o'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\qoMghgHw] 'DllName' = 'qoMghgHw.dll'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] '{BC728C13-5691-4529-A1C2-E662A9AD1C87}' = ''
- %TEMP%\HYT5DF\data.dat -SF 5B351A20D4934DD0 service.dat service.exe
- %TEMP%\nsq3.tmp\ns5.tmp "%TEMP%\HYT5DF\data.dat" -SF 5B351A20D4934DD0 service.dat service.exe
- %WINDIR%\17PHolmes1044.exe 61A847B5BBF72813329F3C466188719AB689201522886B092CBD44BD8689220221DD3257
- %TEMP%\HYT5DF\service.exe
- %TEMP%\nsq3.tmp\ns4.tmp "%TEMP%\HYT5DF\data.dat" -SF 5B351A20D4934DD0 lsas.dat lsas.exe
- %TEMP%\HYT5DF\keygen.exe
- %TEMP%\HYT5DF\lsas.exe
- %TEMP%\HYT5DF\data.dat -SF 5B351A20D4934DD0 lsas.dat lsas.exe
- %WINDIR%\17PHolmes1044.exe (загружен из сети Интернет)
- <SYSTEM32>\cmd.exe /c ""%TEMP%\cq.bat" "
- <SYSTEM32>\cmd.exe /c %TEMP%\removalfile.bat "%TEMP%\HYT5DF\lsas.exe"
- <SYSTEM32>\winlogon.exe
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '{A8A88C49-5EB2-4990-A1A2-0876022C854F}' = ''
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1A10' = '00000000'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '{AEBA21FA-782A-4A90-978D-B72164C80120}' = ''
- %TEMP%\removalfile.bat
- %TEMP%\nsq3.tmp\ns5.tmp
- <SYSTEM32>\qoMghgHw.dll
- <SYSTEM32>\geBssrQI.dll
- %WINDIR%\17PHolmes1044.exe
- %TEMP%\cq.bat
- %TEMP%\HYT5DF\service.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\17PHolmes[1].cmt
- %HOMEPATH%\Cookies\%USERNAME%@wmvmedialease[1].txt
- %TEMP%\HYT5DF\keygen.exe
- %TEMP%\HYT5DF\lsas.dat
- %TEMP%\nsv2.tmp
- %TEMP%\HYT5DF\data.dat
- %TEMP%\nsq3.tmp\ns4.tmp
- %TEMP%\HYT5DF\lsas.exe
- %TEMP%\HYT5DF\service.dat
- %TEMP%\nsq3.tmp\nsExec.dll
- %TEMP%\HYT5DF\lsas.dat
- %TEMP%\HYT5DF\data.dat
- %TEMP%\nsq3.tmp\nsExec.dll
- %TEMP%\HYT5DF\service.dat
- %TEMP%\HYT5DF\lsas.exe
- %TEMP%\nsq3.tmp\ns4.tmp
- %TEMP%\HYT5DF\service.exe
- %TEMP%\nsq3.tmp\ns5.tmp
- 'ks#.###44.wrs.mcboo.com':80
- ks#.###44.wrs.mcboo.com/17PHolmes.cmt
- DNS ASK ks#.###44.wrs.mcboo.com
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: '' WindowName: 'PowerISO *KeyGenerator*'