
TSPY_KOVTER.XXE
Trojan:Win32/Starter.P (Microsoft); RDN/Generic.grp (McAfee); Mal/Kovter-Z (Sophos); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Crypt7.KIJ (AVG)
Windows

- マルウェアタイプ: Spyware
- 破壊活動の有無: なし
- 暗号化:
- 感染報告の有無: はい
概要
スパイウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
スパイウェアは、実行後、自身を削除します。
詳細
侵入方法
スパイウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
インストール
スパイウェアは、以下のフォルダを作成します。
- %Application Data%\ogamy
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
- %System Root%\_121796_
- %System Root%\b2bca961ed8717886284ef
- %System Root%\b2bca961ed8717886284ef\update
(註:%Application Data%フォルダは、Windows 2000、XP および Server 2003 の場合、通常 "C:\Documents and Settings\<ユーザ名>\Local Settings\Application Data"、Windows Vista 、 7 、8、8.1 、Server 2008 および Server 2012の場合、"C:\Users\<ユーザ名>\AppData\Roaming" です。.. %User Profile% フォルダは、Windows 2000、XP および Server 2003 の場合、通常、"C:\Documents and Settings\<ユーザ名>"、Windows Vista 、 7 、8、8.1 、Server 2008 および Server 2012の場合、"C:\Users\<ユーザ名>" です。.. %System Root%フォルダは、オペレーティングシステム(OS)が存在する場所で、いずれのOSでも通常、 "C:" です。.)
他のシステム変更
スパイウェアは、以下のレジストリキーを追加します。
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
HKEY_CURRENT_USER\Software\qanz
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade
HKEY_LOCAL_MACHINE\SOFTWARE\C8D17E7689AD3F46
HKEY_LOCAL_MACHINE\SOFTWARE\088D4F183DC19C527CB
スパイウェアは、以下のレジストリ値を追加します。
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
zojewbdazo = "{random characters}"
HKEY_CURRENT_USER\Software\qanz
zojewbdazo = "{random characters}"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate
DisableOSUpgrade = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade
ReservationsAllowed = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
ltpxeirzlt = "d21EiJVpBUEhkQ=="
HKEY_CURRENT_USER\Software\qanz
ltpxeirzlt = "Ij5Bj5duUcExPQ=="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
bjtkim = "eGtA3pRuBZbouX5+6/2/1nCH7SQsEv8="
HKEY_CURRENT_USER\Software\qanz
bjtkim = "ITAViJ8+A6q0S2mpZAL9zgUSGZW/Mco="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
eljz = "cWtBicQxVrBQYE/FBUKboXE="
HKEY_CURRENT_USER\Software\qanz
eljz = "JjhM2ZNrBcXrnzh8mw66bxk="
HKEY_LOCAL_MACHINE\SOFTWARE\qanz
kqdg = "{random characters}"
HKEY_CURRENT_USER\Software\qanz
kqdg = "{random characters}"
HKEY_LOCAL_MACHINE\SOFTWARE\C8D17E7689AD3F46
65A0392C88DA701DD7 = "65A0392C88DA701DD7"
HKEY_LOCAL_MACHINE\SOFTWARE\088D4F183DC19C527CB
CE54657BD4BBDD77E = "CE54657BD4BBDD77E"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "0"
スパイウェアは、以下のレジストリ値を変更します。
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1206 = "0"
(註:変更前の上記レジストリ値は、「3」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
2300 = "0"
(註:変更前の上記レジストリ値は、「1」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1809 = "3"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1206 = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
2300 = "0"
(註:変更前の上記レジストリ値は、「1」となります。)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1809 = "3"
(註:変更前の上記レジストリ値は、「3」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4C95A9902ABE0777CED18D6ACCC3372D2748381E
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4BA7B9DDD68788E12FF852E1A024204BF286A8F6
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
47AFB915CDA26D82467B97FA42914468726138DD
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4463C531D7CCC1006794612BB656D3BF8257846F
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43F9B110D5BAFD48225231B0D0082B372FEF9A54
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43DDB1FFF3B49B73831407F6BC8B975023D07C50
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4072BA31FEC351438480F62E6CB95508461EAB2F
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
394FF6850B06BE52E51856CC10E180E882B385CC
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
36863563FD5128C7BEA6F005CFE9B43668086CCE
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2F173F7DE99667AFA57AF80AA2D1B12FAC830338
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
284F55C41A1A7A3F8328D4C262FB376ED6096F24
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
273EE12457FDC4F90C55E82B56167F62F532E547
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
23E594945195F2414803B4D564D2A3A3F5D88B8C
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
216B2A29E62A00CE820146D8244141B92511B279
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
209900B63D955728140CD13622D8C687A4EB0085
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1F55E8839BAC30728BE7108EDE7B0BB0D3298224
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
049811056AFE9FD0F5BE01685AACE6A5D1C4454C
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0483ED3399AC3608058722EDBC5E4600E3BEF9D7
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0048F8D37B153F6EA2798C323EF4F318A5624A9E
Blob = "{random values}"
(註:変更前の上記レジストリ値は、「{random values}」となります。)
スパイウェアは、以下のレジストリキーを削除します。
HKEY_LOCAL_MACHINE\SOFTWARE
作成活動
スパイウェアは、以下のファイルを作成します。
- %Application Data%\ogamy\ogamy.exe
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab16.tmp
- %User Temp%\Tar18.tmp
- %User Temp%\WindowsXP-KB968930-x86-ENG.exe
- %System Root%\b2bca961ed8717886284ef\eventforwarding.adm
- %System Root%\b2bca961ed8717886284ef\windowsremotemanagement.adm
- %System Root%\b2bca961ed8717886284ef\windowsremoteshell.adm
- %System Root%\b2bca961ed8717886284ef\windowspowershellhelp.chm
- %System Root%\b2bca961ed8717886284ef\winrm.cmd
- %System Root%\b2bca961ed8717886284ef\compiledcomposition.microsoft.powershell.gpowershell.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.interop.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.editor.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.editor.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.gpowershell.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.gpowershell.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.graphicalhost.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.graphicalhost.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.runtime.dll
- %System Root%\b2bca961ed8717886284ef\powershell_ise.resources.dll
- %System Root%\b2bca961ed8717886284ef\pspluginwkr.dll
- %System Root%\b2bca961ed8717886284ef\pwrshmsg.dll
- %System Root%\b2bca961ed8717886284ef\pwrshplugin.dll
- %System Root%\b2bca961ed8717886284ef\pwrshsip.dll
- %System Root%\b2bca961ed8717886284ef\spmsg.dll
- %System Root%\b2bca961ed8717886284ef\system.management.automation.dll
- %System Root%\b2bca961ed8717886284ef\system.management.automation.resources.dll
- %System Root%\b2bca961ed8717886284ef\wevtfwd.dll
- %System Root%\b2bca961ed8717886284ef\winrmprov.dll
- %System Root%\b2bca961ed8717886284ef\winrscmd.dll
- %System Root%\b2bca961ed8717886284ef\winrsmgr.dll
- %System Root%\b2bca961ed8717886284ef\winrssrv.dll
- %System Root%\b2bca961ed8717886284ef\wsmauto.dll
- %System Root%\b2bca961ed8717886284ef\wsmplpxy.dll
- %System Root%\b2bca961ed8717886284ef\wsmres.dll
- %System Root%\b2bca961ed8717886284ef\wsmsvc.dll
- %System Root%\b2bca961ed8717886284ef\wsmwmipl.dll
- %System Root%\b2bca961ed8717886284ef\powershell.exe
- %System Root%\b2bca961ed8717886284ef\powershell_ise.exe
- %System Root%\b2bca961ed8717886284ef\pscustomsetuputil.exe
- %System Root%\b2bca961ed8717886284ef\pssetupnativeutils.exe
- %System Root%\b2bca961ed8717886284ef\spuninst.exe
- %System Root%\b2bca961ed8717886284ef\spupdsvc.exe
- %System Root%\b2bca961ed8717886284ef\winrs.exe
- %System Root%\b2bca961ed8717886284ef\winrshost.exe
- %System Root%\b2bca961ed8717886284ef\wsmanhttpconfig.exe
- %System Root%\b2bca961ed8717886284ef\wsmprovhost.exe
- %System Root%\b2bca961ed8717886284ef\wtrinstaller.ico
- %System Root%\b2bca961ed8717886284ef\winrm.ini
- %System Root%\b2bca961ed8717886284ef\winrmprov.mof
- %System Root%\b2bca961ed8717886284ef\wsmauto.mof
- %System Root%\b2bca961ed8717886284ef\powershell.exe.mui
- %System Root%\b2bca961ed8717886284ef\profile.ps1
- %System Root%\b2bca961ed8717886284ef\bitstransfer.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\certificate.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\diagnostics.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\dotnettypes.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\filesystem.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\getevent.types.ps1xml
- %System Root%\b2bca961ed8717886284ef\help.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\powershellcore.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\powershelltrace.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\registry.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\types.ps1xml
- %System Root%\b2bca961ed8717886284ef\wsman.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\bitstransfer.psd1
- %System Root%\b2bca961ed8717886284ef\importallmodules.psd1
- %System Root%\b2bca961ed8717886284ef\about_aliases.help.txt
- %System Root%\b2bca961ed8717886284ef\about_arithmetic_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_arrays.help.txt
- %System Root%\b2bca961ed8717886284ef\about_assignment_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_automatic_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_bits_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\about_break.help.txt
- %System Root%\b2bca961ed8717886284ef\about_command_precedence.help.txt
- %System Root%\b2bca961ed8717886284ef\about_command_syntax.help.txt
- %System Root%\b2bca961ed8717886284ef\about_comment_based_help.help.txt
- %System Root%\b2bca961ed8717886284ef\about_commonparameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_comparison_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_continue.help.txt
- %System Root%\b2bca961ed8717886284ef\about_core_commands.help.txt
- %System Root%\b2bca961ed8717886284ef\about_data_sections.help.txt
- %System Root%\b2bca961ed8717886284ef\about_debuggers.help.txt
- %System Root%\b2bca961ed8717886284ef\about_do.help.txt
- %System Root%\b2bca961ed8717886284ef\about_environment_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_escape_characters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_eventlogs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_execution_policies.help.txt
- %System Root%\b2bca961ed8717886284ef\about_for.help.txt
- %System Root%\b2bca961ed8717886284ef\about_foreach.help.txt
- %System Root%\b2bca961ed8717886284ef\about_format.ps1xml.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced_methods.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced_parameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_cmdletbindingattribute.help.txt
- %System Root%\b2bca961ed8717886284ef\about_hash_tables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_history.help.txt
- %System Root%\b2bca961ed8717886284ef\about_if.help.txt
- %System Root%\b2bca961ed8717886284ef\about_job_details.help.txt
- %System Root%\b2bca961ed8717886284ef\about_jobs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_join.help.txt
- %System Root%\b2bca961ed8717886284ef\about_language_keywords.help.txt
- %System Root%\b2bca961ed8717886284ef\about_line_editing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_locations.help.txt
- %System Root%\b2bca961ed8717886284ef\about_logical_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_methods.help.txt
- %System Root%\b2bca961ed8717886284ef\about_modules.help.txt
- %System Root%\b2bca961ed8717886284ef\about_objects.help.txt
- %System Root%\b2bca961ed8717886284ef\about_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_parameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_parsing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_path_syntax.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pipelines.help.txt
- %System Root%\b2bca961ed8717886284ef\about_preference_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_profiles.help.txt
- %System Root%\b2bca961ed8717886284ef\about_prompts.help.txt
- %System Root%\b2bca961ed8717886284ef\about_properties.help.txt
- %System Root%\b2bca961ed8717886284ef\about_providers.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssession_details.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssessions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssnapins.help.txt
- %System Root%\b2bca961ed8717886284ef\about_quoting_rules.help.txt
- %System Root%\b2bca961ed8717886284ef\about_redirection.help.txt
- %System Root%\b2bca961ed8717886284ef\about_ref.help.txt
- %System Root%\b2bca961ed8717886284ef\about_regular_expressions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_faq.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_jobs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_output.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_requirements.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_troubleshooting.help.txt
- %System Root%\b2bca961ed8717886284ef\about_requires.help.txt
- %System Root%\b2bca961ed8717886284ef\about_reserved_words.help.txt
- %System Root%\b2bca961ed8717886284ef\about_return.help.txt
- %System Root%\b2bca961ed8717886284ef\about_scopes.help.txt
- %System Root%\b2bca961ed8717886284ef\about_script_blocks.help.txt
- %System Root%\b2bca961ed8717886284ef\about_script_internationalization.help.txt
- %System Root%\b2bca961ed8717886284ef\about_scripts.help.txt
- %System Root%\b2bca961ed8717886284ef\about_session_configurations.help.txt
- %System Root%\b2bca961ed8717886284ef\about_signing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_special_characters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_split.help.txt
- %System Root%\b2bca961ed8717886284ef\about_switch.help.txt
- %System Root%\b2bca961ed8717886284ef\about_throw.help.txt
- %System Root%\b2bca961ed8717886284ef\about_transactions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_trap.help.txt
- %System Root%\b2bca961ed8717886284ef\about_try_catch_finally.help.txt
- %System Root%\b2bca961ed8717886284ef\about_type_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_types.ps1xml.help.txt
- %System Root%\b2bca961ed8717886284ef\about_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_while.help.txt
- %System Root%\b2bca961ed8717886284ef\about_wildcards.help.txt
- %System Root%\b2bca961ed8717886284ef\about_windows_powershell_2.0.help.txt
- %System Root%\b2bca961ed8717886284ef\about_windows_powershell_ise.help.txt
- %System Root%\b2bca961ed8717886284ef\about_wmi_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\about_ws-management_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\default.help.txt
- %System Root%\b2bca961ed8717886284ef\winrm.vbs
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\system.management.automation.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\wsmpty.xsl
- %System Root%\b2bca961ed8717886284ef\wsmtxt.xsl
- %System Root%\b2bca961ed8717886284ef\update\kb968930xp.cat
- %System Root%\b2bca961ed8717886284ef\update\spcustom.dll
- %System Root%\b2bca961ed8717886284ef\update\updspapi.dll
- %System Root%\b2bca961ed8717886284ef\update\update.exe
- %System Root%\b2bca961ed8717886284ef\update\update.inf
- %System Root%\b2bca961ed8717886284ef\update\eula.txt
- %System Root%\b2bca961ed8717886284ef\update\update.ver
- %System Root%\b2bca961ed8717886284ef\$shtdwn$.req
その他
スパイウェアは、以下の不正なWebサイトにアクセスします。
- http://{BLOCKED}7.72.90
- http://{BLOCKED}7.72.90/{random path}
- {BLOCKED}8.174.44
- {BLOCKED}.50.246
- {BLOCKED}2.114.7
- {BLOCKED}9.175.108
- {BLOCKED}.228.87
- {BLOCKED}.211.35
- {BLOCKED}.140.34
- {BLOCKED}5.84.1
- {BLOCKED}.123.101
- {BLOCKED}226.15
- {BLOCKED}.253.109
- {BLOCKED}94.231
- {BLOCKED}1.35.137
- {BLOCKED}.242.184
- {BLOCKED}4.167.43
- {BLOCKED}.170.81
- {BLOCKED}2.62.103
- {BLOCKED}186.57
- {BLOCKED}.90.249
- {BLOCKED}.212.32
- {BLOCKED}9.200.74
- {BLOCKED}.247.154
- {BLOCKED}.112.173
- {BLOCKED}.79.141
- {BLOCKED}202.33
- {BLOCKED}.152.28
- {BLOCKED}5.175.70
- {BLOCKED}1.159.70
- {BLOCKED}.197.200
- {BLOCKED}77.77
- {BLOCKED}.224.176
- {BLOCKED}216.248
- {BLOCKED}.67.62
- {BLOCKED}.140.250
- {BLOCKED}.92.25
- {BLOCKED}.149.203
- {BLOCKED}.62.226
- {BLOCKED}.206.82
- {BLOCKED}2.121.229
- {BLOCKED}.124.172
- {BLOCKED}.19.190
- {BLOCKED}.105.166
- {BLOCKED}.44.170
- {BLOCKED}.235.60
- {BLOCKED}.186.141
- {BLOCKED}158.17
- {BLOCKED}2.42.119
- {BLOCKED}.2.175
- {BLOCKED}1.88.62
- {BLOCKED}6.176.171
- {BLOCKED}.79.174
- {BLOCKED}1.132.70
- {BLOCKED}.7.137
- {BLOCKED}.102.64
- {BLOCKED}.10.93
- {BLOCKED}240.25
- {BLOCKED}.35.7
- {BLOCKED}.89.36
- {BLOCKED}239.213
- {BLOCKED}193.239
- {BLOCKED}.233.54
- {BLOCKED}142.191
- {BLOCKED}.196.157
- {BLOCKED}.54.165
- {BLOCKED}0.154.154
- {BLOCKED}6.64.92
- {BLOCKED}.90.128
- {BLOCKED}.164.126
- {BLOCKED}8.121.9
- {BLOCKED}.131.109
- {BLOCKED}184.140
- {BLOCKED}.103.189
- {BLOCKED}3.121.245
- {BLOCKED}.80.156
- {BLOCKED}.81.87
- {BLOCKED}.133.116
- {BLOCKED}7.98.10
- {BLOCKED}.154.152
- {BLOCKED}0.79.139
- {BLOCKED}2.104.147
- {BLOCKED}.122.225
- {BLOCKED}.226.91
- {BLOCKED}.236.53
- {BLOCKED}1.96.17
- {BLOCKED}4.251
- {BLOCKED}125.3
- {BLOCKED}4.198.125
- {BLOCKED}.214.180
- {BLOCKED}254.234
- {BLOCKED}8.255.141
- {BLOCKED}.200.57
- {BLOCKED}1.184.90
- {BLOCKED}7.154.129
- {BLOCKED}79.236
- {BLOCKED}3.89.86
- {BLOCKED}.220.162
- {BLOCKED}12.23
- {BLOCKED}.92.67
- {BLOCKED}0.177.27
- {BLOCKED}.83.82
- {BLOCKED}.55.50
- {BLOCKED}89.142
- {BLOCKED}189.136
- {BLOCKED}7.32.193
- {BLOCKED}0.8.86
- {BLOCKED}8.97.13
- {BLOCKED}9.104.208
- {BLOCKED}199.129
- {BLOCKED}241.129
- {BLOCKED}.121.255
- {BLOCKED}.191.218
- {BLOCKED}4.167.179
- {BLOCKED}171.20
- {BLOCKED}.179.148
- {BLOCKED}131.235
- {BLOCKED}1.117.26
- {BLOCKED}.98.166
- {BLOCKED}57.67
- {BLOCKED}3.155.252
- {BLOCKED}.113.220
- {BLOCKED}.78.119
- {BLOCKED}.64.249
- {BLOCKED}.31.129
- {BLOCKED}.174.133
- {BLOCKED}7.150.250
- {BLOCKED}2.89.174
- {BLOCKED}.39.43
- {BLOCKED}.135.140
- {BLOCKED}6.159.96
- {BLOCKED}3.190.206
- {BLOCKED}236.58
- {BLOCKED}135.45
- {BLOCKED}.188.179
- {BLOCKED}1.169.31
- {BLOCKED}20.55
- {BLOCKED}8.62.81
- {BLOCKED}.118.91
- {BLOCKED}5.198
- {BLOCKED}.207.66
- {BLOCKED}.50.93
- {BLOCKED}1.149.14
- {BLOCKED}.115.218
- {BLOCKED}248.8
- {BLOCKED}5.62.218
- {BLOCKED}42.51
- {BLOCKED}20.51
- {BLOCKED}1.152.22
- {BLOCKED}9.232.228
- {BLOCKED}2.251.70
- {BLOCKED}3.138.117
- {BLOCKED}6.251.43
- {BLOCKED}0.187.234
- {BLOCKED}7.232.200
- {BLOCKED}.150.75
- {BLOCKED}0.246.252
- {BLOCKED}55.249
- {BLOCKED}190.150
- {BLOCKED}.175.212
- {BLOCKED}5.207.31
- {BLOCKED}63.232
- {BLOCKED}5.234.154
- {BLOCKED}7.232.130
- {BLOCKED}.197.152
- {BLOCKED}6.104
- {BLOCKED}1.95
- {BLOCKED}.84.150
- {BLOCKED}9.52.41
- {BLOCKED}9.177.120
- {BLOCKED}5.32.111
- {BLOCKED}.11.8
- {BLOCKED}.3.134
- {BLOCKED}.177.88
- {BLOCKED}.236.242
- {BLOCKED}.50.49
- {BLOCKED}.126.162
- {BLOCKED}3.78.224
- {BLOCKED}5.93.12
- {BLOCKED}.147.228
- {BLOCKED}7.150.99
- {BLOCKED}177.134
- {BLOCKED}246.85
- {BLOCKED}6.161.190
- {BLOCKED}137.32
- {BLOCKED}3.132.37
- {BLOCKED}.227.112
- {BLOCKED}.122.173
- {BLOCKED}8.24.64
- {BLOCKED}.48.203
- {BLOCKED}.66.142
- {BLOCKED}.73.246
- {BLOCKED}73.141
- {BLOCKED}.131.83
- {BLOCKED}9.163.174
- {BLOCKED}.252.174
- {BLOCKED}2.142.106
- {BLOCKED}147.175
- {BLOCKED}.81.254
- {BLOCKED}.184.170
- {BLOCKED}.109.158
- {BLOCKED}251.24
- {BLOCKED}181.93
- {BLOCKED}.206.243
- {BLOCKED}.147.205
- {BLOCKED}7.33.251
- {BLOCKED}4.106.98
- {BLOCKED}9.211.124
- {BLOCKED}.247.229
- {BLOCKED}.59.96
- {BLOCKED}7.57.72
- {BLOCKED}.50.118
- {BLOCKED}5.65.70
- {BLOCKED}3.228.47
- {BLOCKED}4.75.111
- {BLOCKED}7.36.250
- {BLOCKED}3.221.166
- {BLOCKED}4.89.56
- {BLOCKED}1.193.142
- {BLOCKED}.130.109
- {BLOCKED}.214.102
- {BLOCKED}0.139
- {BLOCKED}.42.220
- {BLOCKED}1.5.152
- {BLOCKED}.252.80
- {BLOCKED}.41.144
- {BLOCKED}4.103.20
- {BLOCKED}8.51.119
- {BLOCKED}113.234
- {BLOCKED}.238.201
- {BLOCKED}.204.231
- {BLOCKED}3.222.84
- {BLOCKED}13.19
- {BLOCKED}.6.184
- {BLOCKED}9.75.174
- {BLOCKED}8.165.112
- {BLOCKED}.191.70
- {BLOCKED}3.35.3
- {BLOCKED}.181.11
- {BLOCKED}7.122.62
- {BLOCKED}.110.242
- {BLOCKED}34.163
- {BLOCKED}97.143
- {BLOCKED}.146
- {BLOCKED}.162.204
- {BLOCKED}170.12
スパイウェアは、実行後、自身を削除します。
このウイルス情報は、自動解析システムにより作成されました。
対応方法
手順 1
Windows XP、Windows Vista および Windows 7 のユーザは、コンピュータからマルウェアもしくはアドウェア等を完全に削除するために、ウイルス検索の実行前には必ず「システムの復元」を無効にしてください。
手順 2
不明なレジストリキーを削除します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
- FeatureControl
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl
- FEATURE_BROWSER_EMULATION
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl
- FEATURE_BROWSER_EMULATION
- In HKEY_CURRENT_USER\Software
- qanz
- In HKEY_LOCAL_MACHINE\SOFTWARE
- qanz
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
- OSUpgrade
- In HKEY_LOCAL_MACHINE\SOFTWARE
- C8D17E7689AD3F46
- In HKEY_LOCAL_MACHINE\SOFTWARE
- 088D4F183DC19C527CB
手順 3
このレジストリ値を削除します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- regsvr32.exe = "22b8"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- iexplore.exe = "22b8"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- regsvr32.exe = "22b8"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
- iexplore.exe = "22b8"
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- zojewbdazo = "{random characters}"
- In HKEY_CURRENT_USER\Software\qanz
- zojewbdazo = "{random characters}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
- DisableOSUpgrade = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\OSUpgrade
- ReservationsAllowed = "0"
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- ltpxeirzlt = "d21EiJVpBUEhkQ=="
- In HKEY_CURRENT_USER\Software\qanz
- ltpxeirzlt = "Ij5Bj5duUcExPQ=="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- bjtkim = "eGtA3pRuBZbouX5+6/2/1nCH7SQsEv8="
- In HKEY_CURRENT_USER\Software\qanz
- bjtkim = "ITAViJ8+A6q0S2mpZAL9zgUSGZW/Mco="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- eljz = "cWtBicQxVrBQYE/FBUKboXE="
- In HKEY_CURRENT_USER\Software\qanz
- eljz = "JjhM2ZNrBcXrnzh8mw66bxk="
- In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
- kqdg = "{random characters}"
- In HKEY_CURRENT_USER\Software\qanz
- kqdg = "{random characters}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\C8D17E7689AD3F46
- 65A0392C88DA701DD7 = "65A0392C88DA701DD7"
- In HKEY_LOCAL_MACHINE\SOFTWARE\088D4F183DC19C527CB
- CE54657BD4BBDD77E = "CE54657BD4BBDD77E"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
- LogLevel = "2"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
- LogLevel = "0"
手順 4
変更されたレジストリ値を修正します。
警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
事前に意図的に対象の設定を変更していた場合は、意図するオリジナルの設定に戻してください。変更する値が分からない場合は、システム管理者にお尋ねいただき、レジストリの編集はお客様の責任として行なって頂くようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 1206 = "0"
To: 1206 = ""3""
- From: 1206 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 2300 = "0"
To: 2300 = ""1""
- From: 2300 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- 1809 = "3"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- 1206 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 2300 = "0"
To: 2300 = ""1""
- From: 2300 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 1809 = "3"
To: 1809 = ""3""
- From: 1809 = "3"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4C95A9902ABE0777CED18D6ACCC3372D2748381E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4BA7B9DDD68788E12FF852E1A024204BF286A8F6
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47AFB915CDA26D82467B97FA42914468726138DD
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4463C531D7CCC1006794612BB656D3BF8257846F
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43F9B110D5BAFD48225231B0D0082B372FEF9A54
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43DDB1FFF3B49B73831407F6BC8B975023D07C50
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4072BA31FEC351438480F62E6CB95508461EAB2F
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\394FF6850B06BE52E51856CC10E180E882B385CC
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36863563FD5128C7BEA6F005CFE9B43668086CCE
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F173F7DE99667AFA57AF80AA2D1B12FAC830338
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\284F55C41A1A7A3F8328D4C262FB376ED6096F24
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\273EE12457FDC4F90C55E82B56167F62F532E547
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\23E594945195F2414803B4D564D2A3A3F5D88B8C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\216B2A29E62A00CE820146D8244141B92511B279
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\209900B63D955728140CD13622D8C687A4EB0085
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1F55E8839BAC30728BE7108EDE7B0BB0D3298224
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\049811056AFE9FD0F5BE01685AACE6A5D1C4454C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0483ED3399AC3608058722EDBC5E4600E3BEF9D7
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0048F8D37B153F6EA2798C323EF4F318A5624A9E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
手順 5
以下のファイルを検索し削除します。
- %Application Data%\ogamy\ogamy.exe
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab16.tmp
- %User Temp%\Tar18.tmp
- %User Temp%\WindowsXP-KB968930-x86-ENG.exe
- %System Root%\b2bca961ed8717886284ef\eventforwarding.adm
- %System Root%\b2bca961ed8717886284ef\windowsremotemanagement.adm
- %System Root%\b2bca961ed8717886284ef\windowsremoteshell.adm
- %System Root%\b2bca961ed8717886284ef\windowspowershellhelp.chm
- %System Root%\b2bca961ed8717886284ef\winrm.cmd
- %System Root%\b2bca961ed8717886284ef\compiledcomposition.microsoft.powershell.gpowershell.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.interop.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.editor.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.editor.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.gpowershell.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.gpowershell.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.graphicalhost.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.graphicalhost.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.resources.dll
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.runtime.dll
- %System Root%\b2bca961ed8717886284ef\powershell_ise.resources.dll
- %System Root%\b2bca961ed8717886284ef\pspluginwkr.dll
- %System Root%\b2bca961ed8717886284ef\pwrshmsg.dll
- %System Root%\b2bca961ed8717886284ef\pwrshplugin.dll
- %System Root%\b2bca961ed8717886284ef\pwrshsip.dll
- %System Root%\b2bca961ed8717886284ef\spmsg.dll
- %System Root%\b2bca961ed8717886284ef\system.management.automation.dll
- %System Root%\b2bca961ed8717886284ef\system.management.automation.resources.dll
- %System Root%\b2bca961ed8717886284ef\wevtfwd.dll
- %System Root%\b2bca961ed8717886284ef\winrmprov.dll
- %System Root%\b2bca961ed8717886284ef\winrscmd.dll
- %System Root%\b2bca961ed8717886284ef\winrsmgr.dll
- %System Root%\b2bca961ed8717886284ef\winrssrv.dll
- %System Root%\b2bca961ed8717886284ef\wsmauto.dll
- %System Root%\b2bca961ed8717886284ef\wsmplpxy.dll
- %System Root%\b2bca961ed8717886284ef\wsmres.dll
- %System Root%\b2bca961ed8717886284ef\wsmsvc.dll
- %System Root%\b2bca961ed8717886284ef\wsmwmipl.dll
- %System Root%\b2bca961ed8717886284ef\powershell.exe
- %System Root%\b2bca961ed8717886284ef\powershell_ise.exe
- %System Root%\b2bca961ed8717886284ef\pscustomsetuputil.exe
- %System Root%\b2bca961ed8717886284ef\pssetupnativeutils.exe
- %System Root%\b2bca961ed8717886284ef\spuninst.exe
- %System Root%\b2bca961ed8717886284ef\spupdsvc.exe
- %System Root%\b2bca961ed8717886284ef\winrs.exe
- %System Root%\b2bca961ed8717886284ef\winrshost.exe
- %System Root%\b2bca961ed8717886284ef\wsmanhttpconfig.exe
- %System Root%\b2bca961ed8717886284ef\wsmprovhost.exe
- %System Root%\b2bca961ed8717886284ef\wtrinstaller.ico
- %System Root%\b2bca961ed8717886284ef\winrm.ini
- %System Root%\b2bca961ed8717886284ef\winrmprov.mof
- %System Root%\b2bca961ed8717886284ef\wsmauto.mof
- %System Root%\b2bca961ed8717886284ef\powershell.exe.mui
- %System Root%\b2bca961ed8717886284ef\profile.ps1
- %System Root%\b2bca961ed8717886284ef\bitstransfer.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\certificate.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\diagnostics.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\dotnettypes.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\filesystem.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\getevent.types.ps1xml
- %System Root%\b2bca961ed8717886284ef\help.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\powershellcore.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\powershelltrace.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\registry.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\types.ps1xml
- %System Root%\b2bca961ed8717886284ef\wsman.format.ps1xml
- %System Root%\b2bca961ed8717886284ef\bitstransfer.psd1
- %System Root%\b2bca961ed8717886284ef\importallmodules.psd1
- %System Root%\b2bca961ed8717886284ef\about_aliases.help.txt
- %System Root%\b2bca961ed8717886284ef\about_arithmetic_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_arrays.help.txt
- %System Root%\b2bca961ed8717886284ef\about_assignment_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_automatic_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_bits_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\about_break.help.txt
- %System Root%\b2bca961ed8717886284ef\about_command_precedence.help.txt
- %System Root%\b2bca961ed8717886284ef\about_command_syntax.help.txt
- %System Root%\b2bca961ed8717886284ef\about_comment_based_help.help.txt
- %System Root%\b2bca961ed8717886284ef\about_commonparameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_comparison_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_continue.help.txt
- %System Root%\b2bca961ed8717886284ef\about_core_commands.help.txt
- %System Root%\b2bca961ed8717886284ef\about_data_sections.help.txt
- %System Root%\b2bca961ed8717886284ef\about_debuggers.help.txt
- %System Root%\b2bca961ed8717886284ef\about_do.help.txt
- %System Root%\b2bca961ed8717886284ef\about_environment_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_escape_characters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_eventlogs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_execution_policies.help.txt
- %System Root%\b2bca961ed8717886284ef\about_for.help.txt
- %System Root%\b2bca961ed8717886284ef\about_foreach.help.txt
- %System Root%\b2bca961ed8717886284ef\about_format.ps1xml.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced_methods.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_advanced_parameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_functions_cmdletbindingattribute.help.txt
- %System Root%\b2bca961ed8717886284ef\about_hash_tables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_history.help.txt
- %System Root%\b2bca961ed8717886284ef\about_if.help.txt
- %System Root%\b2bca961ed8717886284ef\about_job_details.help.txt
- %System Root%\b2bca961ed8717886284ef\about_jobs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_join.help.txt
- %System Root%\b2bca961ed8717886284ef\about_language_keywords.help.txt
- %System Root%\b2bca961ed8717886284ef\about_line_editing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_locations.help.txt
- %System Root%\b2bca961ed8717886284ef\about_logical_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_methods.help.txt
- %System Root%\b2bca961ed8717886284ef\about_modules.help.txt
- %System Root%\b2bca961ed8717886284ef\about_objects.help.txt
- %System Root%\b2bca961ed8717886284ef\about_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_parameters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_parsing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_path_syntax.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pipelines.help.txt
- %System Root%\b2bca961ed8717886284ef\about_preference_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_profiles.help.txt
- %System Root%\b2bca961ed8717886284ef\about_prompts.help.txt
- %System Root%\b2bca961ed8717886284ef\about_properties.help.txt
- %System Root%\b2bca961ed8717886284ef\about_providers.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssession_details.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssessions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_pssnapins.help.txt
- %System Root%\b2bca961ed8717886284ef\about_quoting_rules.help.txt
- %System Root%\b2bca961ed8717886284ef\about_redirection.help.txt
- %System Root%\b2bca961ed8717886284ef\about_ref.help.txt
- %System Root%\b2bca961ed8717886284ef\about_regular_expressions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_faq.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_jobs.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_output.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_requirements.help.txt
- %System Root%\b2bca961ed8717886284ef\about_remote_troubleshooting.help.txt
- %System Root%\b2bca961ed8717886284ef\about_requires.help.txt
- %System Root%\b2bca961ed8717886284ef\about_reserved_words.help.txt
- %System Root%\b2bca961ed8717886284ef\about_return.help.txt
- %System Root%\b2bca961ed8717886284ef\about_scopes.help.txt
- %System Root%\b2bca961ed8717886284ef\about_script_blocks.help.txt
- %System Root%\b2bca961ed8717886284ef\about_script_internationalization.help.txt
- %System Root%\b2bca961ed8717886284ef\about_scripts.help.txt
- %System Root%\b2bca961ed8717886284ef\about_session_configurations.help.txt
- %System Root%\b2bca961ed8717886284ef\about_signing.help.txt
- %System Root%\b2bca961ed8717886284ef\about_special_characters.help.txt
- %System Root%\b2bca961ed8717886284ef\about_split.help.txt
- %System Root%\b2bca961ed8717886284ef\about_switch.help.txt
- %System Root%\b2bca961ed8717886284ef\about_throw.help.txt
- %System Root%\b2bca961ed8717886284ef\about_transactions.help.txt
- %System Root%\b2bca961ed8717886284ef\about_trap.help.txt
- %System Root%\b2bca961ed8717886284ef\about_try_catch_finally.help.txt
- %System Root%\b2bca961ed8717886284ef\about_type_operators.help.txt
- %System Root%\b2bca961ed8717886284ef\about_types.ps1xml.help.txt
- %System Root%\b2bca961ed8717886284ef\about_variables.help.txt
- %System Root%\b2bca961ed8717886284ef\about_while.help.txt
- %System Root%\b2bca961ed8717886284ef\about_wildcards.help.txt
- %System Root%\b2bca961ed8717886284ef\about_windows_powershell_2.0.help.txt
- %System Root%\b2bca961ed8717886284ef\about_windows_powershell_ise.help.txt
- %System Root%\b2bca961ed8717886284ef\about_wmi_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\about_ws-management_cmdlets.help.txt
- %System Root%\b2bca961ed8717886284ef\default.help.txt
- %System Root%\b2bca961ed8717886284ef\winrm.vbs
- %System Root%\b2bca961ed8717886284ef\microsoft.backgroundintelligenttransfer.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.diagnostics.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.commands.utility.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.consolehost.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.powershell.security.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\microsoft.wsman.management.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\system.management.automation.dll-help.xml
- %System Root%\b2bca961ed8717886284ef\wsmpty.xsl
- %System Root%\b2bca961ed8717886284ef\wsmtxt.xsl
- %System Root%\b2bca961ed8717886284ef\update\kb968930xp.cat
- %System Root%\b2bca961ed8717886284ef\update\spcustom.dll
- %System Root%\b2bca961ed8717886284ef\update\updspapi.dll
- %System Root%\b2bca961ed8717886284ef\update\update.exe
- %System Root%\b2bca961ed8717886284ef\update\update.inf
- %System Root%\b2bca961ed8717886284ef\update\eula.txt
- %System Root%\b2bca961ed8717886284ef\update\update.ver
- %System Root%\b2bca961ed8717886284ef\$shtdwn$.req
手順 6
以下のフォルダを検索し削除します。
- %Application Data%\ogamy
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
- %System Root%\_121796_
- %System Root%\b2bca961ed8717886284ef
- %System Root%\b2bca961ed8717886284ef\update
手順 7
最新のバージョン(エンジン、パターンファイル)を導入したウイルス対策製品を用い、ウイルス検索を実行してください。「TSPY_KOVTER.XXE」と検出したファイルはすべて削除してください。 検出されたファイルが、弊社ウイルス対策製品により既に駆除、隔離またはファイル削除の処理が実行された場合、ウイルスの処理は完了しており、他の削除手順は特にありません。
手順 8
以下の削除されたレジストリキーまたはレジストリ値をバックアップを用いて修復します。
※註:マイクロソフト製品に関連したレジストリキーおよびレジストリ値のみが修復されます。このマルウェアもしくはアドウェア等が同社製品以外のプログラムも削除した場合には、該当プログラムを再度インストールする必要があります。
- In HKEY_LOCAL_MACHINE
- SOFTWARE
ご利用はいかがでしたか? アンケートにご協力ください