別名:

Trojan:Win32/Dynamer!rfn (Microsoft); RDN/Generic.grp (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Poweliks.adzq (Kaspersky); Mal/Kovter-Z (Sophos); Trojan.Win32.Kovter.ab (v) (Sunbelt); Trojan horse SCGeneric4.RNU (AVG)

 プラットフォーム:

Windows

 危険度:
 ダメージ度:
 感染力:
 感染確認数:

  • マルウェアタイプ:
    トロイの木馬型

  • 破壊活動の有無:
    なし

  • 暗号化:
     

  • 感染報告の有無 :
    はい

  概要

マルウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。

マルウェアは、実行後、自身を削除します。

  詳細

ファイルサイズ 477,170 bytes
タイプ EXE
メモリ常駐 なし
発見日 2017年8月2日

侵入方法

マルウェアは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。

インストール

マルウェアは、以下のフォルダを作成します。

  • %Application Data%\enomes
  • %System Root%\_125593_
  • %System Root%\4384841f1a9afb134e207b8c
  • %System Root%\4384841f1a9afb134e207b8c\update

(註:%Application Data%フォルダは、Windows 2000、XP および Server 2003 の場合、通常 "C:\Documents and Settings\<ユーザ名>\Local Settings\Application Data"、Windows Vista 、 7 、8、8.1 、Server 2008 および Server 2012の場合、"C:\Users\<ユーザ名>\AppData\Roaming" です。.. %System Root%フォルダは、オペレーティングシステム(OS)が存在する場所で、いずれのOSでも通常、 "C:" です。.)

他のシステム変更

マルウェアは、以下のレジストリキーを追加します。

HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl

HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION

HKEY_CURRENT_USER\Software\qanz

HKEY_LOCAL_MACHINE\SOFTWARE\qanz

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade

HKEY_LOCAL_MACHINE\SOFTWARE\1832C3D54F07C0E4

HKEY_LOCAL_MACHINE\SOFTWARE\CEF4BFBE899D1F46252

マルウェアは、以下のレジストリ値を追加します。

HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"

HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
regsvr32.exe = "22b8"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main\FeatureControl\
FEATURE_BROWSER_EMULATION
iexplore.exe = "22b8"

HKEY_CURRENT_USER\Software\qanz
zojewbdazo = "{random characters}"

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate
DisableOSUpgrade = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows\WindowsUpdate\
OSUpgrade
ReservationsAllowed = "0"

HKEY_LOCAL_MACHINE\SOFTWARE\qanz
ltpxeirzlt = "JW4V2sc9BK5g7w=="

HKEY_CURRENT_USER\Software\qanz
ltpxeirzlt = "JW1M2cMxAPV41w=="

HKEY_LOCAL_MACHINE\SOFTWARE\qanz
bjtkim = "eGpE3cRrAtJ8oJZEF/sDiCLeGhiu4HE="

HKEY_CURRENT_USER\Software\qanz
bjtkim = "cT5DgZQ8BEmubsUDYX+Ykpm4vTLfzkA="

HKEY_LOCAL_MACHINE\SOFTWARE\qanz
eljz = "dT8VicI7A6Ws0xoDO8QFKZI="

HKEY_CURRENT_USER\Software\qanz
eljz = "c25F28JrVoK6uxGcjxBJ4Pg="

HKEY_LOCAL_MACHINE\SOFTWARE\qanz
kqdg = "{random characters}"

HKEY_CURRENT_USER\Software\qanz
kqdg = "{random characters}"

HKEY_LOCAL_MACHINE\SOFTWARE\qanz
zojewbdazo = "{random characters}"

HKEY_LOCAL_MACHINE\SOFTWARE\1832C3D54F07C0E4
150EDC235AE7D2E3 = "150EDC235AE7D2E3"

HKEY_LOCAL_MACHINE\SOFTWARE\CEF4BFBE899D1F46252
7C2B64C36D8FB3864 = "7C2B64C36D8FB3864"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "2"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Setup
LogLevel = "0"

マルウェアは、以下のレジストリ値を変更します。

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1206 = "0"

(註:変更前の上記レジストリ値は、「3」となります。)

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
2300 = "0"

(註:変更前の上記レジストリ値は、「1」となります。)

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1809 = "3"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1206 = "0"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
2300 = "0"

(註:変更前の上記レジストリ値は、「1」となります。)

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1809 = "3"

(註:変更前の上記レジストリ値は、「3」となります。)

マルウェアは、以下のレジストリキーを削除します。

HKEY_LOCAL_MACHINE\SOFTWARE

作成活動

マルウェアは、以下のファイルを作成します。

  • %Application Data%\enomes\enomes.exe
  • %User Temp%\WindowsXP-KB968930-x86-ENG.exe
  • %System Root%\4384841f1a9afb134e207b8c\eventforwarding.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowsremotemanagement.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowsremoteshell.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowspowershellhelp.chm
  • %System Root%\4384841f1a9afb134e207b8c\winrm.cmd
  • %System Root%\4384841f1a9afb134e207b8c\compiledcomposition.microsoft.powershell.gpowershell.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.interop.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.editor.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.editor.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.gpowershell.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.gpowershell.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.graphicalhost.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.graphicalhost.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.runtime.dll
  • %System Root%\4384841f1a9afb134e207b8c\powershell_ise.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\pspluginwkr.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshmsg.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshplugin.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshsip.dll
  • %System Root%\4384841f1a9afb134e207b8c\spmsg.dll
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.dll
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\wevtfwd.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrmprov.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrscmd.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrsmgr.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrssrv.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmauto.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmplpxy.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmres.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmsvc.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmwmipl.dll
  • %System Root%\4384841f1a9afb134e207b8c\powershell.exe
  • %System Root%\4384841f1a9afb134e207b8c\powershell_ise.exe
  • %System Root%\4384841f1a9afb134e207b8c\pscustomsetuputil.exe
  • %System Root%\4384841f1a9afb134e207b8c\pssetupnativeutils.exe
  • %System Root%\4384841f1a9afb134e207b8c\spuninst.exe
  • %System Root%\4384841f1a9afb134e207b8c\spupdsvc.exe
  • %System Root%\4384841f1a9afb134e207b8c\winrs.exe
  • %System Root%\4384841f1a9afb134e207b8c\winrshost.exe
  • %System Root%\4384841f1a9afb134e207b8c\wsmanhttpconfig.exe
  • %System Root%\4384841f1a9afb134e207b8c\wsmprovhost.exe
  • %System Root%\4384841f1a9afb134e207b8c\wtrinstaller.ico
  • %System Root%\4384841f1a9afb134e207b8c\winrm.ini
  • %System Root%\4384841f1a9afb134e207b8c\winrmprov.mof
  • %System Root%\4384841f1a9afb134e207b8c\wsmauto.mof
  • %System Root%\4384841f1a9afb134e207b8c\powershell.exe.mui
  • %System Root%\4384841f1a9afb134e207b8c\profile.ps1
  • %System Root%\4384841f1a9afb134e207b8c\bitstransfer.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\certificate.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\diagnostics.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\dotnettypes.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\filesystem.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\getevent.types.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\help.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\powershellcore.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\powershelltrace.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\registry.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\types.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\wsman.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\bitstransfer.psd1
  • %System Root%\4384841f1a9afb134e207b8c\importallmodules.psd1
  • %System Root%\4384841f1a9afb134e207b8c\about_aliases.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_arithmetic_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_arrays.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_assignment_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_automatic_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_bits_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_break.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_command_precedence.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_command_syntax.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_comment_based_help.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_commonparameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_comparison_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_continue.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_core_commands.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_data_sections.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_debuggers.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_do.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_environment_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_escape_characters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_eventlogs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_execution_policies.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_for.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_foreach.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_format.ps1xml.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced_methods.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced_parameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_cmdletbindingattribute.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_hash_tables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_history.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_if.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_job_details.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_jobs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_join.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_language_keywords.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_line_editing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_locations.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_logical_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_methods.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_modules.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_objects.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_parameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_parsing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_path_syntax.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pipelines.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_preference_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_profiles.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_prompts.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_properties.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_providers.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssession_details.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssessions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssnapins.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_quoting_rules.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_redirection.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_ref.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_regular_expressions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_faq.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_jobs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_output.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_requirements.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_troubleshooting.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_requires.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_reserved_words.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_return.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_scopes.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_script_blocks.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_script_internationalization.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_scripts.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_session_configurations.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_signing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_special_characters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_split.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_switch.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_throw.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_transactions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_trap.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_try_catch_finally.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_type_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_types.ps1xml.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_while.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_wildcards.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_windows_powershell_2.0.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_windows_powershell_ise.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_wmi_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_ws-management_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\default.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\winrm.vbs
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\wsmpty.xsl
  • %System Root%\4384841f1a9afb134e207b8c\wsmtxt.xsl
  • %System Root%\4384841f1a9afb134e207b8c\update\kb968930xp.cat
  • %System Root%\4384841f1a9afb134e207b8c\update\spcustom.dll
  • %System Root%\4384841f1a9afb134e207b8c\update\updspapi.dll
  • %System Root%\4384841f1a9afb134e207b8c\update\update.exe
  • %System Root%\4384841f1a9afb134e207b8c\update\update.inf
  • %System Root%\4384841f1a9afb134e207b8c\update\eula.txt
  • %System Root%\4384841f1a9afb134e207b8c\update\update.ver
  • %System Root%\4384841f1a9afb134e207b8c\$shtdwn$.req

その他

マルウェアは、以下の不正なWebサイトにアクセスします。

  • http://{BLOCKED}7.72.90
  • http://{BLOCKED}7.72.90/{random path}
  • {BLOCKED}.116.72
  • {BLOCKED}81.117
  • {BLOCKED}.173.42
  • {BLOCKED}6.14.255
  • {BLOCKED}6.114.88
  • {BLOCKED}.122.175
  • {BLOCKED}4.156.245
  • {BLOCKED}5.230.244
  • {BLOCKED}4.130.243
  • {BLOCKED}.253.109
  • {BLOCKED}3.232.36
  • {BLOCKED}32.215
  • {BLOCKED}2.197.80
  • {BLOCKED}167.194
  • {BLOCKED}.210.35
  • {BLOCKED}6.119.103
  • {BLOCKED}.17.219
  • {BLOCKED}2.47.172
  • {BLOCKED}.80.33
  • {BLOCKED}8.130.22
  • {BLOCKED}5.204.236
  • {BLOCKED}7.242.24
  • {BLOCKED}.118.72
  • {BLOCKED}6.35.73
  • {BLOCKED}196.248
  • {BLOCKED}.225.251
  • {BLOCKED}.65.75
  • {BLOCKED}.242.184
  • {BLOCKED}9.7.24
  • {BLOCKED}3.122.146
  • {BLOCKED}36.238
  • {BLOCKED}19.155
  • {BLOCKED}9.117.14
  • {BLOCKED}0.230.76
  • {BLOCKED}8.17.201
  • {BLOCKED}219.195
  • {BLOCKED}4.55.117
  • {BLOCKED}4.204.4
  • {BLOCKED}.54.106
  • {BLOCKED}4.42.80
  • {BLOCKED}.135.42
  • {BLOCKED}.41.216
  • {BLOCKED}.216.212
  • {BLOCKED}.72.218
  • {BLOCKED}0.146.43
  • {BLOCKED}107.132
  • {BLOCKED}.104.8
  • {BLOCKED}3.121.72
  • {BLOCKED}6.230.165
  • {BLOCKED}.100.236
  • {BLOCKED}5.44.158
  • {BLOCKED}56.60
  • {BLOCKED}.190.59
  • {BLOCKED}5.74.183
  • {BLOCKED}.183.81
  • {BLOCKED}.35.250
  • {BLOCKED}.163.218
  • {BLOCKED}.147.135
  • {BLOCKED}6.57.170
  • {BLOCKED}.166.46
  • {BLOCKED}.66.97
  • {BLOCKED}.133.50
  • {BLOCKED}31.79
  • {BLOCKED}.205.209
  • {BLOCKED}6.202.94
  • {BLOCKED}.206.124
  • {BLOCKED}.189.117
  • {BLOCKED}4.169.228
  • {BLOCKED}206.125
  • {BLOCKED}78.12
  • {BLOCKED}88.103
  • {BLOCKED}.144.194
  • {BLOCKED}2.177.51
  • {BLOCKED}.241.236
  • {BLOCKED}164.134
  • {BLOCKED}.238.32
  • {BLOCKED}.230.10
  • {BLOCKED}7.61.42
  • {BLOCKED}8.238.59
  • {BLOCKED}.134.28
  • {BLOCKED}.21.137
  • {BLOCKED}21.155
  • {BLOCKED}6.233.44
  • {BLOCKED}.207.125
  • {BLOCKED}96.223
  • {BLOCKED}41.22
  • {BLOCKED}.71.59
  • {BLOCKED}1.217.174
  • {BLOCKED}7.115.9
  • {BLOCKED}183.214
  • {BLOCKED}2.34.121
  • {BLOCKED}31.158
  • {BLOCKED}.102.5
  • {BLOCKED}.75.133
  • {BLOCKED}6.101.191
  • {BLOCKED}6.86.169
  • {BLOCKED}4.152.252
  • {BLOCKED}5.15.69
  • {BLOCKED}.53.165
  • {BLOCKED}125.138
  • {BLOCKED}128.211
  • {BLOCKED}.6.235
  • {BLOCKED}79.227
  • {BLOCKED}.198.182
  • {BLOCKED}.220.40
  • {BLOCKED}9.222.137
  • {BLOCKED}209.78
  • {BLOCKED}177.187
  • {BLOCKED}3.226.190
  • {BLOCKED}9.157.59
  • {BLOCKED}215.230
  • {BLOCKED}.207.178
  • {BLOCKED}.26.137
  • {BLOCKED}.228.37
  • {BLOCKED}.223.205
  • {BLOCKED}4.139.134
  • {BLOCKED}133.141
  • {BLOCKED}3.159.184
  • {BLOCKED}.57.227
  • {BLOCKED}.46.226
  • {BLOCKED}2.189
  • {BLOCKED}8.61.238
  • {BLOCKED}1.116.186
  • {BLOCKED}.165.56
  • {BLOCKED}2.103.100
  • {BLOCKED}9.30.31
  • {BLOCKED}0.133.142
  • {BLOCKED}.82.85
  • {BLOCKED}172.56
  • {BLOCKED}204.80
  • {BLOCKED}5.227.215
  • {BLOCKED}.190.32
  • {BLOCKED}4.211.83
  • {BLOCKED}.160.126
  • {BLOCKED}44.144
  • {BLOCKED}.200.107
  • {BLOCKED}.10.123
  • {BLOCKED}0.12.88
  • {BLOCKED}.254.164
  • {BLOCKED}.253.139
  • {BLOCKED}.231.76
  • {BLOCKED}5.173.34
  • {BLOCKED}196.215
  • {BLOCKED}3.152.97
  • {BLOCKED}.7.236
  • {BLOCKED}.8.157
  • {BLOCKED}0.222.177
  • {BLOCKED}3.215.77
  • {BLOCKED}.127.203
  • {BLOCKED}3.143.240
  • {BLOCKED}2.106.25
  • {BLOCKED}.144.53
  • {BLOCKED}44.55
  • {BLOCKED}.31.241
  • {BLOCKED}8.151.243
  • {BLOCKED}.91.126
  • {BLOCKED}.114.211
  • {BLOCKED}166.236
  • {BLOCKED}9.79.104
  • {BLOCKED}.210.129
  • {BLOCKED}.189.68
  • {BLOCKED}.1.159
  • {BLOCKED}3.198.102
  • {BLOCKED}.219.112
  • {BLOCKED}.250.119
  • {BLOCKED}23.64
  • {BLOCKED}0.182.74
  • {BLOCKED}.230.239
  • {BLOCKED}.99.224
  • {BLOCKED}4.61.68
  • {BLOCKED}.142.187
  • {BLOCKED}.120.227
  • {BLOCKED}3.47.160
  • {BLOCKED}.167.77
  • {BLOCKED}110.151
  • {BLOCKED}.81.190
  • {BLOCKED}8.219.161
  • {BLOCKED}118.151
  • {BLOCKED}.14.27
  • {BLOCKED}7.98.17
  • {BLOCKED}.198.4
  • {BLOCKED}1.202.148
  • {BLOCKED}6.247.216
  • {BLOCKED}.222.164
  • {BLOCKED}.254.23
  • {BLOCKED}.29.192
  • {BLOCKED}.115.231
  • {BLOCKED}.94.135
  • {BLOCKED}8.74.36
  • {BLOCKED}1.112.56
  • {BLOCKED}4.41.255
  • {BLOCKED}7.151.58
  • {BLOCKED}.136.72
  • {BLOCKED}8.88.78
  • {BLOCKED}.21.242
  • {BLOCKED}.67.174
  • {BLOCKED}.228.54
  • {BLOCKED}3.231.212
  • {BLOCKED}9.220.223
  • {BLOCKED}.153.130
  • {BLOCKED}.25.23
  • {BLOCKED}1.26.146
  • {BLOCKED}37.58
  • {BLOCKED}185.180
  • {BLOCKED}39.96
  • {BLOCKED}1.41.222
  • {BLOCKED}.12.8
  • {BLOCKED}9.154.152
  • {BLOCKED}83.32
  • {BLOCKED}.200.217
  • {BLOCKED}224.37
  • {BLOCKED}.136.240
  • {BLOCKED}.35.180
  • {BLOCKED}0.209.245
  • {BLOCKED}.16.19
  • {BLOCKED}.18.96
  • {BLOCKED}.107.47
  • {BLOCKED}3.245.190
  • {BLOCKED}.220.77
  • {BLOCKED}194.193
  • {BLOCKED}.41.194
  • {BLOCKED}.217.49
  • {BLOCKED}8.53.194
  • {BLOCKED}.84.136
  • {BLOCKED}.155.39
  • {BLOCKED}41.73
  • {BLOCKED}.24.178
  • {BLOCKED}146.47
  • {BLOCKED}151.162
  • {BLOCKED}.117.253
  • {BLOCKED}160.84
  • {BLOCKED}.22.241
  • {BLOCKED}.112.242
  • {BLOCKED}.122.162
  • {BLOCKED}235.58
  • {BLOCKED}.211.82
  • {BLOCKED}3.57.93
  • {BLOCKED}.199.15
  • {BLOCKED}112.41

マルウェアは、実行後、自身を削除します。

このウイルス情報は、自動解析システムにより作成されました。

  対応方法

対応検索エンジン: 9.8

手順 1

Windows XP、Windows Vista および Windows 7 のユーザは、コンピュータからマルウェアもしくはアドウェア等を完全に削除するために、ウイルス検索の実行前には必ず「システムの復元」を無効にしてください。

手順 2

不明なレジストリキーを削除します。

[ 詳細 ]

警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。

  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
    • FeatureControl
  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl
    • FEATURE_BROWSER_EMULATION
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl
    • FEATURE_BROWSER_EMULATION
  • In HKEY_CURRENT_USER\Software
    • qanz
  • In HKEY_LOCAL_MACHINE\SOFTWARE
    • qanz
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
    • OSUpgrade
  • In HKEY_LOCAL_MACHINE\SOFTWARE
    • 1832C3D54F07C0E4
  • In HKEY_LOCAL_MACHINE\SOFTWARE
    • CEF4BFBE899D1F46252

手順 3

このレジストリ値を削除します。

[ 詳細 ]

警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
レジストリの編集はお客様の責任で行っていただくようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。

  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
    • regsvr32.exe = "22b8"
  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
    • iexplore.exe = "22b8"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
    • regsvr32.exe = "22b8"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
    • iexplore.exe = "22b8"
  • In HKEY_CURRENT_USER\Software\qanz
    • zojewbdazo = "{random characters}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
    • DisableOSUpgrade = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\OSUpgrade
    • ReservationsAllowed = "0"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
    • ltpxeirzlt = "JW4V2sc9BK5g7w=="
  • In HKEY_CURRENT_USER\Software\qanz
    • ltpxeirzlt = "JW1M2cMxAPV41w=="
  • In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
    • bjtkim = "eGpE3cRrAtJ8oJZEF/sDiCLeGhiu4HE="
  • In HKEY_CURRENT_USER\Software\qanz
    • bjtkim = "cT5DgZQ8BEmubsUDYX+Ykpm4vTLfzkA="
  • In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
    • eljz = "dT8VicI7A6Ws0xoDO8QFKZI="
  • In HKEY_CURRENT_USER\Software\qanz
    • eljz = "c25F28JrVoK6uxGcjxBJ4Pg="
  • In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
    • kqdg = "{random characters}"
  • In HKEY_CURRENT_USER\Software\qanz
    • kqdg = "{random characters}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\qanz
    • zojewbdazo = "{random characters}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\1832C3D54F07C0E4
    • 150EDC235AE7D2E3 = "150EDC235AE7D2E3"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\CEF4BFBE899D1F46252
    • 7C2B64C36D8FB3864 = "7C2B64C36D8FB3864"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
    • LogLevel = "2"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
    • LogLevel = "0"

手順 4

変更されたレジストリ値を修正します。

[ 詳細 ]

警告:レジストリはWindowsの構成情報が格納されているデータベースであり、レジストリの編集内容に問題があると、システムが正常に動作しなくなる場合があります。
事前に意図的に対象の設定を変更していた場合は、意図するオリジナルの設定に戻してください。変更する値が分からない場合は、システム管理者にお尋ねいただき、レジストリの編集はお客様の責任として行なって頂くようお願いいたします。弊社ではレジストリの編集による如何なる問題に対しても補償いたしかねます。
レジストリの編集前にこちらをご参照ください。

  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
    • From: 1206 = "0"
      To: 1206 = ""3""
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
    • From: 2300 = "0"
      To: 2300 = ""1""
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
    • 1809 = "3"
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
    • 1206 = "0"
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
    • From: 2300 = "0"
      To: 2300 = ""1""
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
    • From: 1809 = "3"
      To: 1809 = ""3""

手順 5

以下のファイルを検索し削除します。

[ 詳細 ]
コンポーネントファイルが隠しファイル属性の場合があります。[詳細設定オプション]をクリックし、[隠しファイルとフォルダの検索]のチェックボックスをオンにし、検索結果に隠しファイルとフォルダが含まれるようにしてください。
  • %Application Data%\enomes\enomes.exe
  • %User Temp%\WindowsXP-KB968930-x86-ENG.exe
  • %System Root%\4384841f1a9afb134e207b8c\eventforwarding.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowsremotemanagement.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowsremoteshell.adm
  • %System Root%\4384841f1a9afb134e207b8c\windowspowershellhelp.chm
  • %System Root%\4384841f1a9afb134e207b8c\winrm.cmd
  • %System Root%\4384841f1a9afb134e207b8c\compiledcomposition.microsoft.powershell.gpowershell.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.interop.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.editor.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.editor.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.gpowershell.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.gpowershell.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.graphicalhost.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.graphicalhost.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.runtime.dll
  • %System Root%\4384841f1a9afb134e207b8c\powershell_ise.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\pspluginwkr.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshmsg.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshplugin.dll
  • %System Root%\4384841f1a9afb134e207b8c\pwrshsip.dll
  • %System Root%\4384841f1a9afb134e207b8c\spmsg.dll
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.dll
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.resources.dll
  • %System Root%\4384841f1a9afb134e207b8c\wevtfwd.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrmprov.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrscmd.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrsmgr.dll
  • %System Root%\4384841f1a9afb134e207b8c\winrssrv.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmauto.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmplpxy.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmres.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmsvc.dll
  • %System Root%\4384841f1a9afb134e207b8c\wsmwmipl.dll
  • %System Root%\4384841f1a9afb134e207b8c\powershell.exe
  • %System Root%\4384841f1a9afb134e207b8c\powershell_ise.exe
  • %System Root%\4384841f1a9afb134e207b8c\pscustomsetuputil.exe
  • %System Root%\4384841f1a9afb134e207b8c\pssetupnativeutils.exe
  • %System Root%\4384841f1a9afb134e207b8c\spuninst.exe
  • %System Root%\4384841f1a9afb134e207b8c\spupdsvc.exe
  • %System Root%\4384841f1a9afb134e207b8c\winrs.exe
  • %System Root%\4384841f1a9afb134e207b8c\winrshost.exe
  • %System Root%\4384841f1a9afb134e207b8c\wsmanhttpconfig.exe
  • %System Root%\4384841f1a9afb134e207b8c\wsmprovhost.exe
  • %System Root%\4384841f1a9afb134e207b8c\wtrinstaller.ico
  • %System Root%\4384841f1a9afb134e207b8c\winrm.ini
  • %System Root%\4384841f1a9afb134e207b8c\winrmprov.mof
  • %System Root%\4384841f1a9afb134e207b8c\wsmauto.mof
  • %System Root%\4384841f1a9afb134e207b8c\powershell.exe.mui
  • %System Root%\4384841f1a9afb134e207b8c\profile.ps1
  • %System Root%\4384841f1a9afb134e207b8c\bitstransfer.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\certificate.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\diagnostics.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\dotnettypes.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\filesystem.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\getevent.types.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\help.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\powershellcore.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\powershelltrace.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\registry.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\types.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\wsman.format.ps1xml
  • %System Root%\4384841f1a9afb134e207b8c\bitstransfer.psd1
  • %System Root%\4384841f1a9afb134e207b8c\importallmodules.psd1
  • %System Root%\4384841f1a9afb134e207b8c\about_aliases.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_arithmetic_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_arrays.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_assignment_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_automatic_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_bits_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_break.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_command_precedence.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_command_syntax.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_comment_based_help.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_commonparameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_comparison_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_continue.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_core_commands.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_data_sections.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_debuggers.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_do.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_environment_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_escape_characters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_eventlogs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_execution_policies.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_for.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_foreach.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_format.ps1xml.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced_methods.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_advanced_parameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_functions_cmdletbindingattribute.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_hash_tables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_history.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_if.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_job_details.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_jobs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_join.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_language_keywords.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_line_editing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_locations.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_logical_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_methods.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_modules.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_objects.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_parameters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_parsing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_path_syntax.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pipelines.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_preference_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_profiles.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_prompts.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_properties.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_providers.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssession_details.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssessions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_pssnapins.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_quoting_rules.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_redirection.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_ref.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_regular_expressions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_faq.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_jobs.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_output.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_requirements.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_remote_troubleshooting.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_requires.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_reserved_words.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_return.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_scopes.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_script_blocks.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_script_internationalization.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_scripts.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_session_configurations.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_signing.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_special_characters.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_split.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_switch.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_throw.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_transactions.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_trap.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_try_catch_finally.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_type_operators.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_types.ps1xml.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_variables.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_while.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_wildcards.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_windows_powershell_2.0.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_windows_powershell_ise.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_wmi_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\about_ws-management_cmdlets.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\default.help.txt
  • %System Root%\4384841f1a9afb134e207b8c\winrm.vbs
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.backgroundintelligenttransfer.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.diagnostics.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.commands.utility.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.consolehost.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.powershell.security.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\microsoft.wsman.management.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\system.management.automation.dll-help.xml
  • %System Root%\4384841f1a9afb134e207b8c\wsmpty.xsl
  • %System Root%\4384841f1a9afb134e207b8c\wsmtxt.xsl
  • %System Root%\4384841f1a9afb134e207b8c\update\kb968930xp.cat
  • %System Root%\4384841f1a9afb134e207b8c\update\spcustom.dll
  • %System Root%\4384841f1a9afb134e207b8c\update\updspapi.dll
  • %System Root%\4384841f1a9afb134e207b8c\update\update.exe
  • %System Root%\4384841f1a9afb134e207b8c\update\update.inf
  • %System Root%\4384841f1a9afb134e207b8c\update\eula.txt
  • %System Root%\4384841f1a9afb134e207b8c\update\update.ver
  • %System Root%\4384841f1a9afb134e207b8c\$shtdwn$.req

手順 6

以下のフォルダを検索し削除します。

[ 詳細 ]
フォルダが隠しフォルダ属性に設定されている場合があります。[詳細設定オプション]をクリックし、[隠しファイルとフォルダの検索]のチェックボックスをオンにし、検索結果に隠しファイルとフォルダが含まれるようにしてください。
  • %Application Data%\enomes
  • %System Root%\_125593_
  • %System Root%\4384841f1a9afb134e207b8c
  • %System Root%\4384841f1a9afb134e207b8c\update

手順 7

最新のバージョン(エンジン、パターンファイル)を導入したウイルス対策製品を用い、ウイルス検索を実行してください。「TROJ_KOVTER.AUSKKF」と検出したファイルはすべて削除してください。 検出されたファイルが、弊社ウイルス対策製品により既に駆除、隔離またはファイル削除の処理が実行された場合、ウイルスの処理は完了しており、他の削除手順は特にありません。

手順 8

以下の削除されたレジストリキーまたはレジストリ値をバックアップを用いて修復します。

※註:マイクロソフト製品に関連したレジストリキーおよびレジストリ値のみが修復されます。このマルウェアもしくはアドウェア等が同社製品以外のプログラムも削除した場合には、該当プログラムを再度インストールする必要があります。

  • In HKEY_LOCAL_MACHINE
    • SOFTWARE


ご利用はいかがでしたか? アンケートにご協力ください