TROJ_KOVTER.AUSKKD
RDN/Generic.hbg (McAfee); Trojan.Win32.Poweliks.advs (Kaspersky); Mal/Kovter-Z (Sophos); Trojan.Win32.Kovter.ab (v) (Sunbelt); Trojan horse SCGeneric4.ICV (AVG)
Windows

マルウェアタイプ:
トロイの木馬型
破壊活動の有無:
なし
暗号化:
感染報告の有無 :
はい
概要
マルウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
マルウェアは、実行後、自身を削除します。
詳細
侵入方法
マルウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
インストール
マルウェアは、以下のフォルダを作成します。
- %Application Data%\domoz
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
- %System Root%\_134078_
- %System Root%\f9f4cd96740efcc90da4
- %System Root%\f9f4cd96740efcc90da4\update
(註:%Application Data%フォルダは、Windows 2000、XP および Server 2003 の場合、通常 "C:\Documents and Settings\<ユーザ名>\Local Settings\Application Data"、Windows Vista 、 7 、8、8.1 、Server 2008 および Server 2012の場合、"C:\Users\<ユーザ名>\AppData\Roaming" です。.. %User Profile% フォルダは、Windows 2000、XP および Server 2003 の場合、通常、"C:\Documents and Settings\<ユーザ名>"、Windows Vista 、 7 、8、8.1 、Server 2008 および Server 2012の場合、"C:\Users\<ユーザ名>" です。.. %System Root%フォルダは、オペレーティングシステム(OS)が存在する場所で、いずれのOSでも通常、 "C:" です。.)
他のシステム変更
マルウェアは、以下のレジストリキーを追加します。
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
HKEY_CURRENT_USER\Software\qanz
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade
HKEY_LOCAL_MACHINE\SOFTWARE\B2244D7C9981A86D8
HKEY_LOCAL_MACHINE\SOFTWARE\351B76B552EDDAB9
マルウェアは、以下のレジストリ値を追加します。
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"
HKEY_CURRENT_USER\Software\qanz
zojewbdazo = "{random characters}"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate
DisableOSUpgrade = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade
ReservationsAllowed = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
ltpxeirzlt = "eDFHgMIxVmA7Pg=="
HKEY_CURRENT_USER\Software\qanz
ltpxeirzlt = "dDtM3ZY/Asnhzg=="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
bjtkim = "eTlMjpI/BQSjzNPAY4J5/SfeQxlkk1Y="
HKEY_CURRENT_USER\Software\qanz
bjtkim = "d2pEjcI9Byj8bblvzNiAI6/FwAsPxts="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
eljz = "cW1MjMc9B/I2w1MHXqL3MMM="
HKEY_CURRENT_USER\Software\qanz
eljz = "d20WisBrU1bocRX53JeS+50="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
zojewbdazo = "{random characters}"
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
kqdg = "{random characters}"
HKEY_CURRENT_USER\Software\qanz
kqdg = "{random characters}"
HKEY_LOCAL_MACHINE\SOFTWARE\B2244D7C9981A86D8
8163163030512EEB7 = "8163163030512EEB7"
HKEY_LOCAL_MACHINE\SOFTWARE\351B76B552EDDAB9
F18785C0E71649AA = "F18785C0E71649AA"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "0"
マルウェアは、以下のレジストリ値を変更します。
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1206 = "0"
(註:変更前の上記レジストリ値は、「3」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
2300 = "0"
(註:変更前の上記レジストリ値は、「1」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1809 = "3"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1206 = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
2300 = "0"
(註:変更前の上記レジストリ値は、「1」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1809 = "3"
(註:変更前の上記レジストリ値は、「3」となります。)
マルウェアは、以下のレジストリキーを削除します。
HKEY_LOCAL_MACHINE\SOFTWARE
作成活動
マルウェアは、以下のファイルを作成します。
- %Application Data%\domoz\domoz.exe
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab155.tmp
- %User Temp%\Tar157.tmp
- %User Temp%\WindowsXP-KB968930-x86-ENG.exe
- %System Root%\f9f4cd96740efcc90da4\eventforwarding.adm
- %System Root%\f9f4cd96740efcc90da4\windowsremotemanagement.adm
- %System Root%\f9f4cd96740efcc90da4\windowsremoteshell.adm
- %System Root%\f9f4cd96740efcc90da4\windowspowershellhelp.chm
- %System Root%\f9f4cd96740efcc90da4\winrm.cmd
- %System Root%\f9f4cd96740efcc90da4\compiledcomposition.microsoft.powershell.gpowershell.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.interop.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.editor.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.editor.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.gpowershell.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.gpowershell.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.graphicalhost.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.graphicalhost.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.runtime.dll
- %System Root%\f9f4cd96740efcc90da4\powershell_ise.resources.dll
- %System Root%\f9f4cd96740efcc90da4\pspluginwkr.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshmsg.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshplugin.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshsip.dll
- %System Root%\f9f4cd96740efcc90da4\spmsg.dll
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.dll
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.resources.dll
- %System Root%\f9f4cd96740efcc90da4\wevtfwd.dll
- %System Root%\f9f4cd96740efcc90da4\winrmprov.dll
- %System Root%\f9f4cd96740efcc90da4\winrscmd.dll
- %System Root%\f9f4cd96740efcc90da4\winrsmgr.dll
- %System Root%\f9f4cd96740efcc90da4\winrssrv.dll
- %System Root%\f9f4cd96740efcc90da4\wsmauto.dll
- %System Root%\f9f4cd96740efcc90da4\wsmplpxy.dll
- %System Root%\f9f4cd96740efcc90da4\wsmres.dll
- %System Root%\f9f4cd96740efcc90da4\wsmsvc.dll
- %System Root%\f9f4cd96740efcc90da4\wsmwmipl.dll
- %System Root%\f9f4cd96740efcc90da4\powershell.exe
- %System Root%\f9f4cd96740efcc90da4\powershell_ise.exe
- %System Root%\f9f4cd96740efcc90da4\pscustomsetuputil.exe
- %System Root%\f9f4cd96740efcc90da4\pssetupnativeutils.exe
- %System Root%\f9f4cd96740efcc90da4\spuninst.exe
- %System Root%\f9f4cd96740efcc90da4\spupdsvc.exe
- %System Root%\f9f4cd96740efcc90da4\winrs.exe
- %System Root%\f9f4cd96740efcc90da4\winrshost.exe
- %System Root%\f9f4cd96740efcc90da4\wsmanhttpconfig.exe
- %System Root%\f9f4cd96740efcc90da4\wsmprovhost.exe
- %System Root%\f9f4cd96740efcc90da4\wtrinstaller.ico
- %System Root%\f9f4cd96740efcc90da4\winrm.ini
- %System Root%\f9f4cd96740efcc90da4\winrmprov.mof
- %System Root%\f9f4cd96740efcc90da4\wsmauto.mof
- %System Root%\f9f4cd96740efcc90da4\powershell.exe.mui
- %System Root%\f9f4cd96740efcc90da4\profile.ps1
- %System Root%\f9f4cd96740efcc90da4\bitstransfer.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\certificate.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\diagnostics.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\dotnettypes.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\filesystem.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\getevent.types.ps1xml
- %System Root%\f9f4cd96740efcc90da4\help.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\powershellcore.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\powershelltrace.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\registry.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\types.ps1xml
- %System Root%\f9f4cd96740efcc90da4\wsman.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\bitstransfer.psd1
- %System Root%\f9f4cd96740efcc90da4\importallmodules.psd1
- %System Root%\f9f4cd96740efcc90da4\about_aliases.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_arithmetic_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_arrays.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_assignment_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_automatic_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_bits_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_break.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_command_precedence.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_command_syntax.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_comment_based_help.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_commonparameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_comparison_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_continue.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_core_commands.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_data_sections.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_debuggers.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_do.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_environment_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_escape_characters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_eventlogs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_execution_policies.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_for.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_foreach.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_format.ps1xml.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced_methods.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced_parameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_cmdletbindingattribute.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_hash_tables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_history.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_if.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_job_details.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_jobs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_join.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_language_keywords.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_line_editing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_locations.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_logical_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_methods.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_modules.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_objects.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_parameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_parsing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_path_syntax.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pipelines.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_preference_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_profiles.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_prompts.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_properties.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_providers.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssession_details.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssessions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssnapins.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_quoting_rules.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_redirection.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_ref.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_regular_expressions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_faq.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_jobs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_output.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_requirements.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_troubleshooting.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_requires.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_reserved_words.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_return.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_scopes.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_script_blocks.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_script_internationalization.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_scripts.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_session_configurations.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_signing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_special_characters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_split.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_switch.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_throw.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_transactions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_trap.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_try_catch_finally.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_type_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_types.ps1xml.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_while.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_wildcards.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_windows_powershell_2.0.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_windows_powershell_ise.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_wmi_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_ws-management_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\default.help.txt
- %System Root%\f9f4cd96740efcc90da4\winrm.vbs
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\wsmpty.xsl
- %System Root%\f9f4cd96740efcc90da4\wsmtxt.xsl
- %System Root%\f9f4cd96740efcc90da4\update\kb968930xp.cat
- %System Root%\f9f4cd96740efcc90da4\update\spcustom.dll
- %System Root%\f9f4cd96740efcc90da4\update\updspapi.dll
- %System Root%\f9f4cd96740efcc90da4\update\update.exe
- %System Root%\f9f4cd96740efcc90da4\update\update.inf
- %System Root%\f9f4cd96740efcc90da4\update\eula.txt
- %System Root%\f9f4cd96740efcc90da4\update\update.ver
- %System Root%\f9f4cd96740efcc90da4\$shtdwn$.req
その他
マルウェアは、以下の不正なWebサイトにアクセスします。
- http://{BLOCKED}7.72.90
- http://{BLOCKED}7.72.90/{random path}
- {BLOCKED}4.210.103
- {BLOCKED}.172.189
- {BLOCKED}.106.135
- {BLOCKED}.17.63
- {BLOCKED}9.213.197
- {BLOCKED}48.81
- {BLOCKED}.98.84
- {BLOCKED}6.170.55
- {BLOCKED}.143.122
- {BLOCKED}0.36.45
- {BLOCKED}.242.184
- {BLOCKED}.53.148
- {BLOCKED}.36.202
- {BLOCKED}.234.24
- {BLOCKED}8.3.176
- {BLOCKED}5.152.227
- {BLOCKED}7.4.126
- {BLOCKED}4.168.199
- {BLOCKED}91.210
- {BLOCKED}.107.221
- {BLOCKED}7.110.116
- {BLOCKED}207.12
- {BLOCKED}185.53
- {BLOCKED}.133.7
- {BLOCKED}4.58.61
- {BLOCKED}.218.205
- {BLOCKED}7.168.16
- {BLOCKED}.197.200
- {BLOCKED}.230.185
- {BLOCKED}4.115.70
- {BLOCKED}.166.251
- {BLOCKED}180.104
- {BLOCKED}.214.195
- {BLOCKED}9.50.188
- {BLOCKED}.230.7
- {BLOCKED}.217.117
- {BLOCKED}.234.28
- {BLOCKED}3.46.71
- {BLOCKED}7.{BLOCKED}7
- {BLOCKED}97.107
- {BLOCKED}.112.128
- {BLOCKED}88.141
- {BLOCKED}4.200.1
- {BLOCKED}9.89.14
- {BLOCKED}2.31.181
- {BLOCKED}.69.240
- {BLOCKED}.169.142
- {BLOCKED}3.219.125
- {BLOCKED}35.170
- {BLOCKED}66.186
- {BLOCKED}237.31
- {BLOCKED}2.45.112
- {BLOCKED}.216.54
- {BLOCKED}.92.81
- {BLOCKED}40.137
- {BLOCKED}.208.117
- {BLOCKED}183.188
- {BLOCKED}77.74
- {BLOCKED}2.193.128
- {BLOCKED}5.62.141
- {BLOCKED}.62.159
- {BLOCKED}13.133
- {BLOCKED}.116.148
- {BLOCKED}0.195.160
- {BLOCKED}.23.222
- {BLOCKED}.216.36
- {BLOCKED}.76.144
- {BLOCKED}.94.159
- {BLOCKED}.27.97
- {BLOCKED}.74.213
- {BLOCKED}.73.163
- {BLOCKED}.229.161
- {BLOCKED}.82.152
- {BLOCKED}236.11
- {BLOCKED}0.25.159
- {BLOCKED}.213.137
- {BLOCKED}6.168.140
- {BLOCKED}4.108.209
- {BLOCKED}5.216.185
- {BLOCKED}7.10.24
- {BLOCKED}.150.169
- {BLOCKED}1.9.197
- {BLOCKED}1.96.63
- {BLOCKED}.174.113
- {BLOCKED}5.172.217
- {BLOCKED}.196.92
- {BLOCKED}.24.246
- {BLOCKED}2.248.85
- {BLOCKED}88.40
- {BLOCKED}.93.144
- {BLOCKED}4.216.130
- {BLOCKED}5.114.177
- {BLOCKED}7.232.57
- {BLOCKED}.234.209
- {BLOCKED}.68.240
- {BLOCKED}5.49.187
- {BLOCKED}.214.204
- {BLOCKED}.73.54
- {BLOCKED}.61.80
- {BLOCKED}4.170.217
- {BLOCKED}0.70.69
- {BLOCKED}6.162.133
- {BLOCKED}9.194.98
- {BLOCKED}4.118.250
- {BLOCKED}.104.144
- {BLOCKED}9.238.75
- {BLOCKED}.73.215
- {BLOCKED}.244.87
- {BLOCKED}210.5
- {BLOCKED}.180.81
- {BLOCKED}177.49
- {BLOCKED}.75.90
- {BLOCKED}.255.25
- {BLOCKED}2.61.54
- {BLOCKED}.150.67
- {BLOCKED}.128.142
- {BLOCKED}5.143.130
- {BLOCKED}137.123
- {BLOCKED}.234.115
- {BLOCKED}4.134.135
- {BLOCKED}1.85.161
- {BLOCKED}0.61.2
- {BLOCKED}.144.3
- {BLOCKED}.63.43
- {BLOCKED}121.180
- {BLOCKED}7.64.175
- {BLOCKED}.245.214
- {BLOCKED}0.179.114
- {BLOCKED}.199.53
- {BLOCKED}3.207.111
- {BLOCKED}16.204
- {BLOCKED}39.207
- {BLOCKED}.14.93
- {BLOCKED}88.98
- {BLOCKED}2.147.210
- {BLOCKED}2.230.246
- {BLOCKED}.129.107
- {BLOCKED}215.145
- {BLOCKED}.212.96
- {BLOCKED}2.139.141
- {BLOCKED}4.98.93
- {BLOCKED}4.148.219
- {BLOCKED}.46.124
- {BLOCKED}8.159
- {BLOCKED}6.249.72
- {BLOCKED}2.221.133
- {BLOCKED}4.97.254
- {BLOCKED}.61.158
- {BLOCKED}194.117
- {BLOCKED}.115.162
- {BLOCKED}.80.93
- {BLOCKED}.52.20
- {BLOCKED}.86.200
- {BLOCKED}21.11
- {BLOCKED}9.235.204
- {BLOCKED}200.173
- {BLOCKED}.250.131
- {BLOCKED}4.123
- {BLOCKED}.231.31
- {BLOCKED}.63.33
- {BLOCKED}6.250.161
- {BLOCKED}.18.175
- {BLOCKED}7.113.227
- {BLOCKED}6.61.237
- {BLOCKED}3.177.253
- {BLOCKED}7.88.181
- {BLOCKED}.37.95
- {BLOCKED}132.206
- {BLOCKED}.182.50
- {BLOCKED}0.40.60
- {BLOCKED}.234.85
- {BLOCKED}.78.38
- {BLOCKED}6.92.77
- {BLOCKED}5.109.18
- {BLOCKED}4.190.168
- {BLOCKED}.41.166
- {BLOCKED}.200.52
- {BLOCKED}.207.127
- {BLOCKED}8.27.209
- {BLOCKED}.28.254
- {BLOCKED}2.169.177
- {BLOCKED}.57.134
- {BLOCKED}8.29.52
- {BLOCKED}8.37.70
- {BLOCKED}2.64.223
- {BLOCKED}.60.239
- {BLOCKED}.3.152
- {BLOCKED}7.122.203
- {BLOCKED}.135.129
- {BLOCKED}.144.237
- {BLOCKED}.118.152
- {BLOCKED}.169.179
- {BLOCKED}247.217
- {BLOCKED}2.231.220
- {BLOCKED}.64.93
- {BLOCKED}1.94.105
- {BLOCKED}.151.200
- {BLOCKED}.153.37
- {BLOCKED}7.15.241
- {BLOCKED}.213.12
- {BLOCKED}.72.61
- {BLOCKED}223.14
- {BLOCKED}2.249.169
- {BLOCKED}.13.106
- {BLOCKED}.126.35
- {BLOCKED}178.112
- {BLOCKED}55.123
- {BLOCKED}2.194.36
- {BLOCKED}.97.140
- {BLOCKED}.223.113
- {BLOCKED}28.225
- {BLOCKED}207.16
- {BLOCKED}9.246.44
- {BLOCKED}94.72
- {BLOCKED}5.108.25
- {BLOCKED}.60.73
- {BLOCKED}.228.77
- {BLOCKED}7.111.139
- {BLOCKED}59.192
- {BLOCKED}6.197.105
- {BLOCKED}112.41
マルウェアは、実行後、自身を削除します。
このウイルス情報は、自動解析システムにより作成されました。
対応方法
手順 1
Windows XP、Windows Vista および Windows 7 のユーザは、コンピュータからマルウェアもしくはアドウェア等を完全に削除するために、ウイルス検索の実行前には必ず「システムの復元」を無効にしてください。
手順 2
不明なレジストリキーを削除します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
- FeatureControl
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl
- FEATURE_BROWSER_EMULATION
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl
- FEATURE_BROWSER_EMULATION
- In HKEY_CURRENT_USER\Software
- qanz
- In HKEY_LOCAL_MACHINE\SOFTWARE
- qanz
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
- OSUpgrade
- In HKEY_LOCAL_MACHINE\SOFTWARE
- B2244D7C9981A86D8
- In HKEY_LOCAL_MACHINE\SOFTWARE
- 351B76B552EDDAB9
手順 3
このレジストリ値を削除します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- regsvr32.exe = "22b8"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- iexplore.exe = "22b8"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- regsvr32.exe = "22b8"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- iexplore.exe = "22b8"
- In HKEY_CURRENT_USER\Software\qanz
- zojewbdazo = "{random characters}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
- DisableOSUpgrade = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\OSUpgrade
- ReservationsAllowed = "0"
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- ltpxeirzlt = "eDFHgMIxVmA7Pg=="
- In HKEY_CURRENT_USER\Software\qanz
- ltpxeirzlt = "dDtM3ZY/Asnhzg=="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- bjtkim = "eTlMjpI/BQSjzNPAY4J5/SfeQxlkk1Y="
- In HKEY_CURRENT_USER\Software\qanz
- bjtkim = "d2pEjcI9Byj8bblvzNiAI6/FwAsPxts="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- eljz = "cW1MjMc9B/I2w1MHXqL3MMM="
- In HKEY_CURRENT_USER\Software\qanz
- eljz = "d20WisBrU1bocRX53JeS+50="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- zojewbdazo = "{random characters}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- kqdg = "{random characters}"
- In HKEY_CURRENT_USER\Software\qanz
- kqdg = "{random characters}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\B2244D7C9981A86D8
- 8163163030512EEB7 = "8163163030512EEB7"
- In HKEY_LOCAL_MACHINE\SOFTWARE\351B76B552EDDAB9
- F18785C0E71649AA = "F18785C0E71649AA"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
- LogLevel = "2"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
- LogLevel = "0"
手順 4
変更されたレジストリ値を修正します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
事前に意図的に対象の設定を変更していた場合は、意図するオリジナルの設定に戻してください。変更する値が分からない場合は、システム管理者にお尋ねいただき、レジストリの編集はお客様の責任として行なって頂くようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 1206 = "0"
To: 1206 = ""3""
- From: 1206 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 2300 = "0"
To: 2300 = ""1""
- From: 2300 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- 1809 = "3"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- 1206 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 2300 = "0"
To: 2300 = ""1""
- From: 2300 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 1809 = "3"
To: 1809 = ""3""
- From: 1809 = "3"
手順 5
以下のファイルを検索し削除します。
- %Application Data%\domoz\domoz.exe
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab155.tmp
- %User Temp%\Tar157.tmp
- %User Temp%\WindowsXP-KB968930-x86-ENG.exe
- %System Root%\f9f4cd96740efcc90da4\eventforwarding.adm
- %System Root%\f9f4cd96740efcc90da4\windowsremotemanagement.adm
- %System Root%\f9f4cd96740efcc90da4\windowsremoteshell.adm
- %System Root%\f9f4cd96740efcc90da4\windowspowershellhelp.chm
- %System Root%\f9f4cd96740efcc90da4\winrm.cmd
- %System Root%\f9f4cd96740efcc90da4\compiledcomposition.microsoft.powershell.gpowershell.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.interop.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.editor.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.editor.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.gpowershell.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.gpowershell.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.graphicalhost.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.graphicalhost.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.resources.dll
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.runtime.dll
- %System Root%\f9f4cd96740efcc90da4\powershell_ise.resources.dll
- %System Root%\f9f4cd96740efcc90da4\pspluginwkr.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshmsg.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshplugin.dll
- %System Root%\f9f4cd96740efcc90da4\pwrshsip.dll
- %System Root%\f9f4cd96740efcc90da4\spmsg.dll
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.dll
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.resources.dll
- %System Root%\f9f4cd96740efcc90da4\wevtfwd.dll
- %System Root%\f9f4cd96740efcc90da4\winrmprov.dll
- %System Root%\f9f4cd96740efcc90da4\winrscmd.dll
- %System Root%\f9f4cd96740efcc90da4\winrsmgr.dll
- %System Root%\f9f4cd96740efcc90da4\winrssrv.dll
- %System Root%\f9f4cd96740efcc90da4\wsmauto.dll
- %System Root%\f9f4cd96740efcc90da4\wsmplpxy.dll
- %System Root%\f9f4cd96740efcc90da4\wsmres.dll
- %System Root%\f9f4cd96740efcc90da4\wsmsvc.dll
- %System Root%\f9f4cd96740efcc90da4\wsmwmipl.dll
- %System Root%\f9f4cd96740efcc90da4\powershell.exe
- %System Root%\f9f4cd96740efcc90da4\powershell_ise.exe
- %System Root%\f9f4cd96740efcc90da4\pscustomsetuputil.exe
- %System Root%\f9f4cd96740efcc90da4\pssetupnativeutils.exe
- %System Root%\f9f4cd96740efcc90da4\spuninst.exe
- %System Root%\f9f4cd96740efcc90da4\spupdsvc.exe
- %System Root%\f9f4cd96740efcc90da4\winrs.exe
- %System Root%\f9f4cd96740efcc90da4\winrshost.exe
- %System Root%\f9f4cd96740efcc90da4\wsmanhttpconfig.exe
- %System Root%\f9f4cd96740efcc90da4\wsmprovhost.exe
- %System Root%\f9f4cd96740efcc90da4\wtrinstaller.ico
- %System Root%\f9f4cd96740efcc90da4\winrm.ini
- %System Root%\f9f4cd96740efcc90da4\winrmprov.mof
- %System Root%\f9f4cd96740efcc90da4\wsmauto.mof
- %System Root%\f9f4cd96740efcc90da4\powershell.exe.mui
- %System Root%\f9f4cd96740efcc90da4\profile.ps1
- %System Root%\f9f4cd96740efcc90da4\bitstransfer.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\certificate.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\diagnostics.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\dotnettypes.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\filesystem.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\getevent.types.ps1xml
- %System Root%\f9f4cd96740efcc90da4\help.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\powershellcore.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\powershelltrace.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\registry.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\types.ps1xml
- %System Root%\f9f4cd96740efcc90da4\wsman.format.ps1xml
- %System Root%\f9f4cd96740efcc90da4\bitstransfer.psd1
- %System Root%\f9f4cd96740efcc90da4\importallmodules.psd1
- %System Root%\f9f4cd96740efcc90da4\about_aliases.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_arithmetic_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_arrays.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_assignment_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_automatic_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_bits_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_break.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_command_precedence.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_command_syntax.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_comment_based_help.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_commonparameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_comparison_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_continue.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_core_commands.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_data_sections.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_debuggers.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_do.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_environment_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_escape_characters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_eventlogs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_execution_policies.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_for.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_foreach.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_format.ps1xml.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced_methods.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_advanced_parameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_functions_cmdletbindingattribute.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_hash_tables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_history.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_if.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_job_details.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_jobs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_join.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_language_keywords.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_line_editing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_locations.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_logical_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_methods.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_modules.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_objects.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_parameters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_parsing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_path_syntax.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pipelines.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_preference_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_profiles.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_prompts.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_properties.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_providers.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssession_details.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssessions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_pssnapins.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_quoting_rules.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_redirection.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_ref.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_regular_expressions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_faq.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_jobs.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_output.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_requirements.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_remote_troubleshooting.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_requires.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_reserved_words.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_return.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_scopes.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_script_blocks.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_script_internationalization.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_scripts.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_session_configurations.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_signing.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_special_characters.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_split.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_switch.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_throw.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_transactions.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_trap.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_try_catch_finally.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_type_operators.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_types.ps1xml.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_variables.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_while.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_wildcards.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_windows_powershell_2.0.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_windows_powershell_ise.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_wmi_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\about_ws-management_cmdlets.help.txt
- %System Root%\f9f4cd96740efcc90da4\default.help.txt
- %System Root%\f9f4cd96740efcc90da4\winrm.vbs
- %System Root%\f9f4cd96740efcc90da4\microsoft.backgroundintelligenttransfer.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.diagnostics.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.commands.utility.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.consolehost.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.powershell.security.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\microsoft.wsman.management.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\system.management.automation.dll-help.xml
- %System Root%\f9f4cd96740efcc90da4\wsmpty.xsl
- %System Root%\f9f4cd96740efcc90da4\wsmtxt.xsl
- %System Root%\f9f4cd96740efcc90da4\update\kb968930xp.cat
- %System Root%\f9f4cd96740efcc90da4\update\spcustom.dll
- %System Root%\f9f4cd96740efcc90da4\update\updspapi.dll
- %System Root%\f9f4cd96740efcc90da4\update\update.exe
- %System Root%\f9f4cd96740efcc90da4\update\update.inf
- %System Root%\f9f4cd96740efcc90da4\update\eula.txt
- %System Root%\f9f4cd96740efcc90da4\update\update.ver
- %System Root%\f9f4cd96740efcc90da4\$shtdwn$.req
手順 6
以下のフォルダを検索し削除します。
- %Application Data%\domoz
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
- %System Root%\_134078_
- %System Root%\f9f4cd96740efcc90da4
- %System Root%\f9f4cd96740efcc90da4\update
手順 7
最新のバージョン(エンジン、パターンファイル)を導入したウイルス対策製品を用い、ウイルス検索を実行してください。「TROJ_KOVTER.AUSKKD」と検出したファイルはすべて削除してください。 検出されたファイルが、弊社ウイルス対策製品により既に駆除、隔離またはファイル削除の処理が実行された場合、ウイルスの処理は完了しており、他の削除手順は特にありません。
手順 8
以下の削除されたレジストリキーまたはレジストリ値をバックアップを用いて修復します。
※註:マイクロソフト製品に関連したレジストリキーおよびレジストリ値のみが修復されます。このマルウェアもしくはアドウェア等が同社製品以外のプログラムも削除した場合には、該当プログラムを再度インストールする必要があります。
- In HKEY_LOCAL_MACHINE
- SOFTWARE
ご利用はいかがでしたか? アンケートにご協力ください