Ransom:Win32/Crowti (Microsoft); RDN/Spybot.bfr!m (McAfee); Trojan.Cryptodefense (Symantec); Trojan-Ransom.Win32.Cryptodef.boj (Kaspersky); Mal/Wonton-J (Sophos); Trojan-Downloader.Win32.Wauchos.afe (v) (Sunbelt); Trojan horse Generic_r.EDP (AVG)

 Piattaforma:

Windows

 Valutazione del rischio complessivo:
 Potenziale dannoso: :
 Potenziale di distribuzione: :
 Reported Infection:
Basso
Medio
Alto
Critico

  • Tipo di minaccia informatica:
    Trojan

  • Distruttivo?:
    No

  • Crittografato?:
     

  • In the wild::
    厂ì

  Panoramica e descrizione

Elimina archivos para impedir la ejecución correcta de programas y aplicaciones.

Este malware se elimina tras la ejecución.

  Dettagli tecnici

Dimensione file: 298,496 bytes
Tipo di file: EXE
Residente in memoria: 厂ì
Data di ricezione campioni iniziali: 04 ottobre 2014

滨苍蝉迟补濒补肠颈ó苍

Crea las carpetas siguientes:

  • %User Profile%\CryptnetUrlCache\MetaData
  • %User Profile%\Microsoft\CryptnetUrlCache
  • %User Profile%\CryptnetUrlCache\Content

(Nota: %User Profile% es la carpeta de perfil del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario} y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}).

)

Técnica de inicio automático

Agrega las siguientes entradas de registro para permitir su ejecución automática cada vez que se inicia el sistema:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
b57968 = "%System Root%\b579687\b579687.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
b579687 = "%User Profile%\Application Data\b579687.exe"

Otras modificaciones del sistema

Modifica los archivos siguientes:

  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD
  • %User Profile%\Templates\excel.xls
  • %User Profile%\Templates\excel4.xls
  • %User Profile%\Templates\powerpnt.ppt
  • %User Profile%\Templates\quattro.wb2
  • %User Profile%\Templates\sndrec.wav
  • %User Profile%\Templates\winword.doc
  • %User Profile%\Templates\winword2.doc
  • %User Profile%\Templates\wordpfct.wpd

(Nota: %Application Data% es la carpeta Application Data del usuario activo, que en el caso de Windows 98 y ME suele estar ubicada en C:\Windows\Profiles\{nombre de usuario}\Application Data, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario}\Application Data y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}\Local Settings\Application Data).

. %User Profile% es la carpeta de perfil del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario} y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}).

)

Elimina los archivos siguientes:

  • %System Root%\b579687

(Nota: %System Root% es la carpeta raíz, normalmente C:\. También es la ubicación del sistema operativo).

)

Agrega las siguientes entradas de registro como parte de la rutina de instalación:

HKEY_CURRENT_USER\software\B579687B9203299F7722443F07F22722

HKEY_CURRENT_USER\software\B579687B9203299F7722443F07F22722\
02222223447777FF

HKEY_CURRENT_USER\Software\Microsoft\
SystemCertificates\CA\Certificates\
5824CF32C3CC2A47443DB10A33BBE3AC8DE524E1

Agrega las siguientes entradas de registro:

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
5a = "{random values}"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
7b = "{random characters}"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
9c = "{random characters}"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
6d = "{random characters}"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Internet Explorer\brndlog.bak = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Internet Explorer\brndlog.txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\excel.xls = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\excel4.xls = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\powerpnt.ppt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\quattro.wb2 = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\sndrec.wav = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\winword.doc = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\winword2.doc = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Templates\wordpfct.wpd = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@atdmt[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@bing[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@c.atdmt[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@c.msn[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@doubleclick[1].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@microsoft[1].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@msn[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@scorecardresearch[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@www.bing[2].txt = "68adfd"

HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\
02222223447777FF
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd"

HKEY_CURRENT_USER\Software\Microsoft\
SystemCertificates\CA\Certificates\
5824CF32C3CC2A47443DB10A33BBE3AC8DE524E1
Blob = "{random values}"

Modifica las siguientes entradas de registro:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\SystemRestore
DisableSR = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2F173F7DE99667AFA57AF80AA2D1B12FAC830338
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4C95A9902ABE0777CED18D6ACCC3372D2748381E
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4BA7B9DDD68788E12FF852E1A024204BF286A8F6
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
47AFB915CDA26D82467B97FA42914468726138DD
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4463C531D7CCC1006794612BB656D3BF8257846F
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43F9B110D5BAFD48225231B0D0082B372FEF9A54
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43DDB1FFF3B49B73831407F6BC8B975023D07C50
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4072BA31FEC351438480F62E6CB95508461EAB2F
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
394FF6850B06BE52E51856CC10E180E882B385CC
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
36863563FD5128C7BEA6F005CFE9B43668086CCE
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\CA\Certificates\
E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
284F55C41A1A7A3F8328D4C262FB376ED6096F24
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
273EE12457FDC4F90C55E82B56167F62F532E547
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
23E594945195F2414803B4D564D2A3A3F5D88B8C
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
216B2A29E62A00CE820146D8244141B92511B279
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
209900B63D955728140CD13622D8C687A4EB0085
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1F55E8839BAC30728BE7108EDE7B0BB0D3298224
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
049811056AFE9FD0F5BE01685AACE6A5D1C4454C
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0483ED3399AC3608058722EDBC5E4600E3BEF9D7
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0048F8D37B153F6EA2798C323EF4F318A5624A9E
Blob = "{random values}"

(Note: The default value data of the said registry entry is {random values}.)

Rutina de infiltración

Infiltra los archivos siguientes:

  • %System Root%\b579687\b579687.exe
  • %User Profile%\Application Data\b579687.exe
  • %User Startup%\b579687.exe
  • A:\DECRYPT_INSTRUCTION.TXT
  • A:\DECRYPT_INSTRUCTION.HTML
  • A:\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Internet Explorer\brndlog.bak.vw7
  • %User Profile%\Internet Explorer\brndlog.bak
  • %User Profile%\Internet Explorer\brndlog.txt.0wp
  • %User Profile%\Internet Explorer\brndlog.txt
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.tv6
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.URL
  • %Application Data%\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Templates\excel.xls.r2z
  • %User Profile%\Templates\excel4.xls.24z
  • %User Profile%\Templates\powerpnt.ppt.a64
  • %User Profile%\Templates\quattro.wb2.u1c
  • %User Profile%\Templates\sndrec.wav.3xh
  • %User Profile%\Templates\winword.doc.t7y
  • %User Profile%\Templates\winword2.doc.40l
  • %User Profile%\Templates\wordpfct.wpd.pl0
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.URL
  • %User Profile%\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Internet Explorer\brndlog.bak.f8v
  • %User Profile%\Internet Explorer\brndlog.txt.715
  • %User Profile%\Cookies\wilbert@atdmt[2].txt.78m
  • %User Profile%\Cookies\wilbert@atdmt[2].txt
  • %User Profile%\Cookies\wilbert@bing[2].txt.6zn
  • %User Profile%\Cookies\wilbert@bing[2].txt
  • %User Profile%\Cookies\wilbert@c.atdmt[2].txt.9rr
  • %User Profile%\Cookies\wilbert@c.atdmt[2].txt
  • %User Profile%\Cookies\wilbert@c.msn[2].txt.j7a
  • %User Profile%\Cookies\wilbert@c.msn[2].txt
  • %User Profile%\Cookies\wilbert@doubleclick[1].txt.f1a
  • %User Profile%\Cookies\wilbert@doubleclick[1].txt
  • %User Profile%\Cookies\wilbert@microsoft[1].txt.o36
  • %User Profile%\Cookies\wilbert@microsoft[1].txt
  • %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt.q0y
  • %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt
  • %User Profile%\Cookies\wilbert@msn[2].txt.h18
  • %User Profile%\Cookies\wilbert@msn[2].txt
  • %User Profile%\Cookies\wilbert@scorecardresearch[2].txt.l4y
  • %User Profile%\Cookies\wilbert@scorecardresearch[2].txt
  • %User Profile%\Cookies\wilbert@www.bing[2].txt.3er
  • %User Profile%\Cookies\wilbert@www.bing[2].txt
  • %User Profile%\Cookies\wilbert@www.msn[1].txt.fi9
  • %User Profile%\Cookies\wilbert@www.msn[1].txt
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.v1h
  • %User Profile%\Templates\excel.xls.k6q
  • %User Profile%\Templates\excel4.xls.c1d
  • %User Profile%\Templates\powerpnt.ppt.9qq
  • %User Profile%\Templates\quattro.wb2.p0e
  • %User Profile%\Templates\sndrec.wav.tp3
  • %User Profile%\Templates\winword.doc.jo5
  • %User Profile%\Templates\winword2.doc.f83
  • %User Profile%\Templates\wordpfct.wpd.h51
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.TXT
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.HTML
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.URL
  • %System Root%\DECRYPT_INSTRUCTION.TXT
  • %System Root%\DECRYPT_INSTRUCTION.HTML
  • %System Root%\DECRYPT_INSTRUCTION.URL
  • %Desktop%\DECRYPT_INSTRUCTION.TXT
  • %Desktop%\DECRYPT_INSTRUCTION.HTML
  • %Desktop%\DECRYPT_INSTRUCTION.URL
  • %User Startup%\DECRYPT_INSTRUCTION.TXT
  • %User Startup%\DECRYPT_INSTRUCTION.HTML
  • %User Startup%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\MetaData\0A873D20E943287602D5D327C5CA3D2F
  • %User Profile%\Content\0A873D20E943287602D5D327C5CA3D2F
  • %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
  • %User Profile%\Content\2BF68F4714092295550497DD56F57004
  • %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
  • %User Profile%\Content\94308059B57B3142E455B38A6EB92015
  • %User Temp%\CabA3.tmp
  • %User Temp%\TarA5.tmp

Otros detalles

Este malware se elimina tras la ejecución.

  Soluzioni

Motore di scansione minimo: 9.700

Step 1

Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.

Step 2

Reiniciar en modo seguro

[ learnMore ]

Step 3

Eliminar esta clave del Registro

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.

  • In HKEY_CURRENT_USER\software
    • B579687B9203299F7722443F07F22722
  • In HKEY_CURRENT_USER\software\B579687B9203299F7722443F07F22722
    • 02222223447777FF
  • In HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\CA\Certificates
    • 5824CF32C3CC2A47443DB10A33BBE3AC8DE524E1

Step 4

Eliminar este valor del Registro

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.

  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    • b57968 = "%System Root%\b579687\b579687.exe"
  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    • b579687 = "%User Profile%\Application Data\b579687.exe"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
    • 5a = "{random values}"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
    • 7b = "{random characters}"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
    • 9c = "{random characters}"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722
    • 6d = "{random characters}"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Internet Explorer\brndlog.bak = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Internet Explorer\brndlog.txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\excel.xls = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\excel4.xls = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\powerpnt.ppt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\quattro.wb2 = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\sndrec.wav = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\winword.doc = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\winword2.doc = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Templates\wordpfct.wpd = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@atdmt[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@bing[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@c.atdmt[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@c.msn[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@doubleclick[1].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@microsoft[1].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@msn[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@scorecardresearch[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@www.bing[2].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\B579687B9203299F7722443F07F22722\02222223447777FF
    • %User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd"
  • In HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\CA\Certificates\5824CF32C3CC2A47443DB10A33BBE3AC8DE524E1
    • Blob = "{random values}"

Step 5

Restaurar este valor del Registro modificado

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
    • DisableSR = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F173F7DE99667AFA57AF80AA2D1B12FAC830338
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4C95A9902ABE0777CED18D6ACCC3372D2748381E
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4BA7B9DDD68788E12FF852E1A024204BF286A8F6
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47AFB915CDA26D82467B97FA42914468726138DD
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4463C531D7CCC1006794612BB656D3BF8257846F
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43F9B110D5BAFD48225231B0D0082B372FEF9A54
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43DDB1FFF3B49B73831407F6BC8B975023D07C50
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4072BA31FEC351438480F62E6CB95508461EAB2F
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\394FF6850B06BE52E51856CC10E180E882B385CC
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36863563FD5128C7BEA6F005CFE9B43668086CCE
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\284F55C41A1A7A3F8328D4C262FB376ED6096F24
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\273EE12457FDC4F90C55E82B56167F62F532E547
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\23E594945195F2414803B4D564D2A3A3F5D88B8C
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\216B2A29E62A00CE820146D8244141B92511B279
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\209900B63D955728140CD13622D8C687A4EB0085
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1F55E8839BAC30728BE7108EDE7B0BB0D3298224
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\049811056AFE9FD0F5BE01685AACE6A5D1C4454C
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0483ED3399AC3608058722EDBC5E4600E3BEF9D7
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0048F8D37B153F6EA2798C323EF4F318A5624A9E
    • From: Blob = "{random values}"
      To: Blob = ""{random values}""

Step 6

Buscar y eliminar estos archivos

[ learnMore ]
Puede que algunos de los archivos del componente estén ocultos. Asegúrese de que tiene activada la casilla Buscar archivos y carpetas ocultos en la opción "Más opciones avanzadas" para que el resultado de la búsqueda incluya todos los archivos y carpetas ocultos.
  • %System Root%\b579687\b579687.exe
  • %User Profile%\Application Data\b579687.exe
  • %User Startup%\b579687.exe
  • A:\DECRYPT_INSTRUCTION.TXT
  • A:\DECRYPT_INSTRUCTION.HTML
  • A:\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Internet Explorer\brndlog.bak.vw7
  • %User Profile%\Internet Explorer\brndlog.bak
  • %User Profile%\Internet Explorer\brndlog.txt.0wp
  • %User Profile%\Internet Explorer\brndlog.txt
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Microsoft\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Application Data\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.tv6
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\Microsoft\DECRYPT_INSTRUCTION.URL
  • %Application Data%\DECRYPT_INSTRUCTION.TXT
  • %Application Data%\DECRYPT_INSTRUCTION.HTML
  • %Application Data%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Local Settings\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Templates\excel.xls.r2z
  • %User Profile%\Templates\excel4.xls.24z
  • %User Profile%\Templates\powerpnt.ppt.a64
  • %User Profile%\Templates\quattro.wb2.u1c
  • %User Profile%\Templates\sndrec.wav.3xh
  • %User Profile%\Templates\winword.doc.t7y
  • %User Profile%\Templates\winword2.doc.40l
  • %User Profile%\Templates\wordpfct.wpd.pl0
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Templates\DECRYPT_INSTRUCTION.URL
  • %User Profile%\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\Internet Explorer\brndlog.bak.f8v
  • %User Profile%\Internet Explorer\brndlog.txt.715
  • %User Profile%\Cookies\wilbert@atdmt[2].txt.78m
  • %User Profile%\Cookies\wilbert@atdmt[2].txt
  • %User Profile%\Cookies\wilbert@bing[2].txt.6zn
  • %User Profile%\Cookies\wilbert@bing[2].txt
  • %User Profile%\Cookies\wilbert@c.atdmt[2].txt.9rr
  • %User Profile%\Cookies\wilbert@c.atdmt[2].txt
  • %User Profile%\Cookies\wilbert@c.msn[2].txt.j7a
  • %User Profile%\Cookies\wilbert@c.msn[2].txt
  • %User Profile%\Cookies\wilbert@doubleclick[1].txt.f1a
  • %User Profile%\Cookies\wilbert@doubleclick[1].txt
  • %User Profile%\Cookies\wilbert@microsoft[1].txt.o36
  • %User Profile%\Cookies\wilbert@microsoft[1].txt
  • %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt.q0y
  • %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt
  • %User Profile%\Cookies\wilbert@msn[2].txt.h18
  • %User Profile%\Cookies\wilbert@msn[2].txt
  • %User Profile%\Cookies\wilbert@scorecardresearch[2].txt.l4y
  • %User Profile%\Cookies\wilbert@scorecardresearch[2].txt
  • %User Profile%\Cookies\wilbert@www.bing[2].txt.3er
  • %User Profile%\Cookies\wilbert@www.bing[2].txt
  • %User Profile%\Cookies\wilbert@www.msn[1].txt.fi9
  • %User Profile%\Cookies\wilbert@www.msn[1].txt
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.TXT
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.HTML
  • %User Profile%\Cookies\DECRYPT_INSTRUCTION.URL
  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.v1h
  • %User Profile%\Templates\excel.xls.k6q
  • %User Profile%\Templates\excel4.xls.c1d
  • %User Profile%\Templates\powerpnt.ppt.9qq
  • %User Profile%\Templates\quattro.wb2.p0e
  • %User Profile%\Templates\sndrec.wav.tp3
  • %User Profile%\Templates\winword.doc.jo5
  • %User Profile%\Templates\winword2.doc.f83
  • %User Profile%\Templates\wordpfct.wpd.h51
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.TXT
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.HTML
  • %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.URL
  • %System Root%\DECRYPT_INSTRUCTION.TXT
  • %System Root%\DECRYPT_INSTRUCTION.HTML
  • %System Root%\DECRYPT_INSTRUCTION.URL
  • %Desktop%\DECRYPT_INSTRUCTION.TXT
  • %Desktop%\DECRYPT_INSTRUCTION.HTML
  • %Desktop%\DECRYPT_INSTRUCTION.URL
  • %User Startup%\DECRYPT_INSTRUCTION.TXT
  • %User Startup%\DECRYPT_INSTRUCTION.HTML
  • %User Startup%\DECRYPT_INSTRUCTION.URL
  • %User Profile%\MetaData\0A873D20E943287602D5D327C5CA3D2F
  • %User Profile%\Content\0A873D20E943287602D5D327C5CA3D2F
  • %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
  • %User Profile%\Content\2BF68F4714092295550497DD56F57004
  • %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
  • %User Profile%\Content\94308059B57B3142E455B38A6EB92015
  • %User Temp%\CabA3.tmp
  • %User Temp%\TarA5.tmp

Step 7

Buscar y eliminar estas carpetas

[ learnMore ]
Asegúrese de que tiene activada la casilla Buscar archivos y carpetas ocultos en la opción Más opciones avanzadas para que el resultado de la búsqueda incluya todas las carpetas ocultas.
  • %User Profile%\CryptnetUrlCache\MetaData
  • %User Profile%\Microsoft\CryptnetUrlCache
  • %User Profile%\CryptnetUrlCache\Content

Step 8

Reinicie en modo normal y explore el equipo con su producto de live casino online para buscar los archivos identificados como TROJ_CRYPCTB.D En caso de que el producto de live casino online ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta para obtener más información.

Step 9

Restaurar este archivo a partir de una copia de seguridad Solo se pueden restaurar los archivos relacionados con Microsoft. En caso de que este malware/grayware/spyware también haya eliminado archivos relativos a programas que no sean de Microsoft, vuelva a instalar los programas en cuestión en el equipo.

  • %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD
  • %User Profile%\Templates\excel.xls
  • %User Profile%\Templates\excel4.xls
  • %User Profile%\Templates\powerpnt.ppt
  • %User Profile%\Templates\quattro.wb2
  • %User Profile%\Templates\sndrec.wav
  • %User Profile%\Templates\winword.doc
  • %User Profile%\Templates\winword2.doc
  • %User Profile%\Templates\wordpfct.wpd


Sondaggio