TROJ_CRYPCTB.E
Ransom:Win32/Crowti.A (Microsoft); RDN/Ransom!ek (McAfee); Trojan.Cryptodefense (Symantec); Trojan-Ransom.Win32.Blocker.fuad (Kaspersky); Mal/EncPk-AMO (Sophos); Trojan.Win32.Generic!BT (Sunbelt)
Windows
Threat Type:
Trojan
Destructiveness:
No
Encrypted:
In the wild::
Yes
OVERVIEW
Elimina archivos para impedir la ejecución correcta de programas y aplicaciones.
Este malware se elimina tras la ejecución.
TECHNICAL DETAILS
滨苍蝉迟补濒补肠颈ó苍
Crea las carpetas siguientes:
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
(Nota: %User Profile% es la carpeta de perfil del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario} y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}).
)Técnica de inicio automático
Agrega las siguientes entradas de registro para permitir su ejecución automática cada vez que se inicia el sistema:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
a94040 = "%System Root%\a94040f\a94040f.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
a94040f = "%User Profile%\Application Data\a94040f.exe"
Otras modificaciones del sistema
Modifica los archivos siguientes:
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD
- %User Profile%\Templates\excel.xls
- %User Profile%\Templates\excel4.xls
- %User Profile%\Templates\powerpnt.ppt
- %User Profile%\Templates\quattro.wb2
- %User Profile%\Templates\sndrec.wav
- %User Profile%\Templates\winword.doc
- %User Profile%\Templates\winword2.doc
- %User Profile%\Templates\wordpfct.wpd
(Nota: %Application Data% es la carpeta Application Data del usuario activo, que en el caso de Windows 98 y ME suele estar ubicada en C:\Windows\Profiles\{nombre de usuario}\Application Data, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario}\Application Data y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}\Local Settings\Application Data).
. %User Profile% es la carpeta de perfil del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario} y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}).)Elimina los archivos siguientes:
- %System Root%\a94040f
(Nota: %System Root% es la carpeta raíz, normalmente C:\. También es la ubicación del sistema operativo).
)Agrega las siguientes entradas de registro como parte de la rutina de instalación:
HKEY_CURRENT_USER\software\A94040F9A1878677CACDA1786068A430
HKEY_CURRENT_USER\software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
Agrega las siguientes entradas de registro:
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
9a = "{random values}"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
4b = "{random characters}"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
0c = "{random characters}"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
4d = "{random characters}"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Internet Explorer\brndlog.bak = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Internet Explorer\brndlog.txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\excel.xls = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\excel4.xls = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\powerpnt.ppt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\quattro.wb2 = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\sndrec.wav = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\winword.doc = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\winword2.doc = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Templates\wordpfct.wpd = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@atdmt[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@bing[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@c.atdmt[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@c.msn[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@doubleclick[1].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@microsoft[1].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@msn[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@scorecardresearch[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@www.bing[2].txt = "68adfd"
HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\
0013466788AAACCD
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd"
Modifica las siguientes entradas de registro:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\SystemRestore
DisableSR = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4C95A9902ABE0777CED18D6ACCC3372D2748381E
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4BA7B9DDD68788E12FF852E1A024204BF286A8F6
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
47AFB915CDA26D82467B97FA42914468726138DD
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4463C531D7CCC1006794612BB656D3BF8257846F
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43F9B110D5BAFD48225231B0D0082B372FEF9A54
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
43DDB1FFF3B49B73831407F6BC8B975023D07C50
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
4072BA31FEC351438480F62E6CB95508461EAB2F
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
394FF6850B06BE52E51856CC10E180E882B385CC
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
36863563FD5128C7BEA6F005CFE9B43668086CCE
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2F173F7DE99667AFA57AF80AA2D1B12FAC830338
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
284F55C41A1A7A3F8328D4C262FB376ED6096F24
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
273EE12457FDC4F90C55E82B56167F62F532E547
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
23E594945195F2414803B4D564D2A3A3F5D88B8C
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
216B2A29E62A00CE820146D8244141B92511B279
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
209900B63D955728140CD13622D8C687A4EB0085
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1F55E8839BAC30728BE7108EDE7B0BB0D3298224
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
049811056AFE9FD0F5BE01685AACE6A5D1C4454C
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0483ED3399AC3608058722EDBC5E4600E3BEF9D7
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
0048F8D37B153F6EA2798C323EF4F318A5624A9E
Blob = "{random values}"
(Note: The default value data of the said registry entry is {random values}.)
Rutina de infiltración
Infiltra los archivos siguientes:
- %System Root%\a94040f\a94040f.exe
- %User Profile%\Application Data\a94040f.exe
- %User Startup%\a94040f.exe
- A:\DECRYPT_INSTRUCTION.TXT
- A:\DECRYPT_INSTRUCTION.HTML
- A:\DECRYPT_INSTRUCTION.URL
- %User Profile%\Internet Explorer\brndlog.bak.348
- %User Profile%\Internet Explorer\brndlog.bak
- %User Profile%\Internet Explorer\brndlog.txt.66v
- %User Profile%\Internet Explorer\brndlog.txt
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.URL
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.URL
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.kh7
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.URL
- %Application Data%\DECRYPT_INSTRUCTION.TXT
- %Application Data%\DECRYPT_INSTRUCTION.HTML
- %Application Data%\DECRYPT_INSTRUCTION.URL
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.URL
- %User Profile%\Templates\excel.xls.fy5
- %User Profile%\Templates\excel4.xls.3iv
- %User Profile%\Templates\powerpnt.ppt.4tx
- %User Profile%\Templates\quattro.wb2.pm4
- %User Profile%\Templates\sndrec.wav.0cl
- %User Profile%\Templates\winword.doc.2jw
- %User Profile%\Templates\winword2.doc.25x
- %User Profile%\Templates\wordpfct.wpd.57e
- %User Profile%\Templates\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Templates\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Templates\DECRYPT_INSTRUCTION.URL
- %User Profile%\DECRYPT_INSTRUCTION.TXT
- %User Profile%\DECRYPT_INSTRUCTION.HTML
- %User Profile%\DECRYPT_INSTRUCTION.URL
- %User Profile%\Internet Explorer\brndlog.bak.v32
- %User Profile%\Internet Explorer\brndlog.txt.81f
- %User Profile%\Cookies\wilbert@atdmt[2].txt.d12
- %User Profile%\Cookies\wilbert@atdmt[2].txt
- %User Profile%\Cookies\wilbert@bing[2].txt.qj6
- %User Profile%\Cookies\wilbert@bing[2].txt
- %User Profile%\Cookies\wilbert@c.atdmt[2].txt.d09
- %User Profile%\Cookies\wilbert@c.atdmt[2].txt
- %User Profile%\Cookies\wilbert@c.msn[2].txt.qf0
- %User Profile%\Cookies\wilbert@c.msn[2].txt
- %User Profile%\Cookies\wilbert@doubleclick[1].txt.cf5
- %User Profile%\Cookies\wilbert@doubleclick[1].txt
- %User Profile%\Cookies\wilbert@microsoft[1].txt.a5k
- %User Profile%\Cookies\wilbert@microsoft[1].txt
- %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt.or8
- %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt
- %User Profile%\Cookies\wilbert@msn[2].txt.0ef
- %User Profile%\Cookies\wilbert@msn[2].txt
- %User Profile%\Cookies\wilbert@scorecardresearch[2].txt.wd1
- %User Profile%\Cookies\wilbert@scorecardresearch[2].txt
- %User Profile%\Cookies\wilbert@www.bing[2].txt.p9f
- %User Profile%\Cookies\wilbert@www.bing[2].txt
- %User Profile%\Cookies\wilbert@www.msn[1].txt.h16
- %User Profile%\Cookies\wilbert@www.msn[1].txt
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.0uv
- %User Profile%\Templates\excel.xls.4f6
- %User Profile%\Templates\excel4.xls.e0f
- %User Profile%\Templates\powerpnt.ppt.l8z
- %User Profile%\Templates\quattro.wb2.2e6
- %User Profile%\Templates\sndrec.wav.3vu
- %User Profile%\Templates\winword.doc.4ih
- %User Profile%\Templates\winword2.doc.gz0
- %User Profile%\Templates\wordpfct.wpd.vn5
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.TXT
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.HTML
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.URL
- %System Root%\DECRYPT_INSTRUCTION.TXT
- %System Root%\DECRYPT_INSTRUCTION.HTML
- %System Root%\DECRYPT_INSTRUCTION.URL
- %Desktop%\DECRYPT_INSTRUCTION.TXT
- %Desktop%\DECRYPT_INSTRUCTION.HTML
- %Desktop%\DECRYPT_INSTRUCTION.URL
- %User Startup%\DECRYPT_INSTRUCTION.TXT
- %User Startup%\DECRYPT_INSTRUCTION.HTML
- %User Startup%\DECRYPT_INSTRUCTION.URL
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab9E.tmp
- %User Temp%\TarA0.tmp
Otros detalles
Este malware se elimina tras la ejecución.
SOLUTION
Step 1
Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.
Step 2
Reiniciar en modo seguro
Step 3
Eliminar esta clave del Registro
Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_CURRENT_USER\software
- A94040F9A1878677CACDA1786068A430
- In HKEY_CURRENT_USER\software\A94040F9A1878677CACDA1786068A430
- 0013466788AAACCD
Step 4
Eliminar este valor del Registro
Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- a94040 = "%System Root%\a94040f\a94040f.exe"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- a94040f = "%User Profile%\Application Data\a94040f.exe"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
- 9a = "{random values}"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
- 4b = "{random characters}"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
- 0c = "{random characters}"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430
- 4d = "{random characters}"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Internet Explorer\brndlog.bak = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Internet Explorer\brndlog.txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\excel.xls = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\excel4.xls = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\powerpnt.ppt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\quattro.wb2 = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\sndrec.wav = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\winword.doc = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\winword2.doc = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Templates\wordpfct.wpd = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@atdmt[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@bing[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@c.atdmt[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@c.msn[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@doubleclick[1].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@microsoft[1].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@msn[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@scorecardresearch[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@www.bing[2].txt = "68adfd"
- In HKEY_CURRENT_USER\Software\A94040F9A1878677CACDA1786068A430\0013466788AAACCD
- %User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd"
Step 5
Restaurar este valor del Registro modificado
Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
- DisableSR = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFCED9C6BDD0C985CA3C7D253063C5BE6FC620C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EF2E6670AC9B5091FE06BE0E5483EAAD6BA32D9
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4C95A9902ABE0777CED18D6ACCC3372D2748381E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4BA7B9DDD68788E12FF852E1A024204BF286A8F6
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4B421F7515F6AE8A6ECEF97F6982A400A4D9224E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\47AFB915CDA26D82467B97FA42914468726138DD
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4463C531D7CCC1006794612BB656D3BF8257846F
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43F9B110D5BAFD48225231B0D0082B372FEF9A54
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\43DDB1FFF3B49B73831407F6BC8B975023D07C50
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\40E78C1D523D1CD9954FAC1A1AB3BD3CBAA15BFC
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4072BA31FEC351438480F62E6CB95508461EAB2F
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3F85F2BB4A62B0B58BE1614ABB0D4631B4BEF8BA
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\394FF6850B06BE52E51856CC10E180E882B385CC
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36863563FD5128C7BEA6F005CFE9B43668086CCE
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F173F7DE99667AFA57AF80AA2D1B12FAC830338
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\284F55C41A1A7A3F8328D4C262FB376ED6096F24
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\273EE12457FDC4F90C55E82B56167F62F532E547
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24BA6D6C8A5B5837A48DB5FAE919EA675C94D217
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\23E594945195F2414803B4D564D2A3A3F5D88B8C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\216B2A29E62A00CE820146D8244141B92511B279
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\209900B63D955728140CD13622D8C687A4EB0085
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1F55E8839BAC30728BE7108EDE7B0BB0D3298224
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\1331F48A5DA8E01DAACA1BB0C17044ACFEF755BB
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\049811056AFE9FD0F5BE01685AACE6A5D1C4454C
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0483ED3399AC3608058722EDBC5E4600E3BEF9D7
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0048F8D37B153F6EA2798C323EF4F318A5624A9E
- From: Blob = "{random values}"
To: Blob = ""{random values}""
- From: Blob = "{random values}"
Step 6
Buscar y eliminar estos archivos
- %System Root%\a94040f\a94040f.exe
- %User Profile%\Application Data\a94040f.exe
- %User Startup%\a94040f.exe
- A:\DECRYPT_INSTRUCTION.TXT
- A:\DECRYPT_INSTRUCTION.HTML
- A:\DECRYPT_INSTRUCTION.URL
- %User Profile%\Internet Explorer\brndlog.bak.348
- %User Profile%\Internet Explorer\brndlog.bak
- %User Profile%\Internet Explorer\brndlog.txt.66v
- %User Profile%\Internet Explorer\brndlog.txt
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Internet Explorer\DECRYPT_INSTRUCTION.URL
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Microsoft\DECRYPT_INSTRUCTION.URL
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Application Data\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.kh7
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\Windows Media\9.0\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\Windows Media\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.TXT
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.HTML
- %Application Data%\Microsoft\DECRYPT_INSTRUCTION.URL
- %Application Data%\DECRYPT_INSTRUCTION.TXT
- %Application Data%\DECRYPT_INSTRUCTION.HTML
- %Application Data%\DECRYPT_INSTRUCTION.URL
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Local Settings\DECRYPT_INSTRUCTION.URL
- %User Profile%\Templates\excel.xls.fy5
- %User Profile%\Templates\excel4.xls.3iv
- %User Profile%\Templates\powerpnt.ppt.4tx
- %User Profile%\Templates\quattro.wb2.pm4
- %User Profile%\Templates\sndrec.wav.0cl
- %User Profile%\Templates\winword.doc.2jw
- %User Profile%\Templates\winword2.doc.25x
- %User Profile%\Templates\wordpfct.wpd.57e
- %User Profile%\Templates\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Templates\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Templates\DECRYPT_INSTRUCTION.URL
- %User Profile%\DECRYPT_INSTRUCTION.TXT
- %User Profile%\DECRYPT_INSTRUCTION.HTML
- %User Profile%\DECRYPT_INSTRUCTION.URL
- %User Profile%\Internet Explorer\brndlog.bak.v32
- %User Profile%\Internet Explorer\brndlog.txt.81f
- %User Profile%\Cookies\wilbert@atdmt[2].txt.d12
- %User Profile%\Cookies\wilbert@atdmt[2].txt
- %User Profile%\Cookies\wilbert@bing[2].txt.qj6
- %User Profile%\Cookies\wilbert@bing[2].txt
- %User Profile%\Cookies\wilbert@c.atdmt[2].txt.d09
- %User Profile%\Cookies\wilbert@c.atdmt[2].txt
- %User Profile%\Cookies\wilbert@c.msn[2].txt.qf0
- %User Profile%\Cookies\wilbert@c.msn[2].txt
- %User Profile%\Cookies\wilbert@doubleclick[1].txt.cf5
- %User Profile%\Cookies\wilbert@doubleclick[1].txt
- %User Profile%\Cookies\wilbert@microsoft[1].txt.a5k
- %User Profile%\Cookies\wilbert@microsoft[1].txt
- %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt.or8
- %User Profile%\Cookies\wilbert@msnportal.112.2o7[1].txt
- %User Profile%\Cookies\wilbert@msn[2].txt.0ef
- %User Profile%\Cookies\wilbert@msn[2].txt
- %User Profile%\Cookies\wilbert@scorecardresearch[2].txt.wd1
- %User Profile%\Cookies\wilbert@scorecardresearch[2].txt
- %User Profile%\Cookies\wilbert@www.bing[2].txt.p9f
- %User Profile%\Cookies\wilbert@www.bing[2].txt
- %User Profile%\Cookies\wilbert@www.msn[1].txt.h16
- %User Profile%\Cookies\wilbert@www.msn[1].txt
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.TXT
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.HTML
- %User Profile%\Cookies\DECRYPT_INSTRUCTION.URL
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD.0uv
- %User Profile%\Templates\excel.xls.4f6
- %User Profile%\Templates\excel4.xls.e0f
- %User Profile%\Templates\powerpnt.ppt.l8z
- %User Profile%\Templates\quattro.wb2.2e6
- %User Profile%\Templates\sndrec.wav.3vu
- %User Profile%\Templates\winword.doc.4ih
- %User Profile%\Templates\winword2.doc.gz0
- %User Profile%\Templates\wordpfct.wpd.vn5
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.TXT
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.HTML
- %System Root%\Documents and Settings\DECRYPT_INSTRUCTION.URL
- %System Root%\DECRYPT_INSTRUCTION.TXT
- %System Root%\DECRYPT_INSTRUCTION.HTML
- %System Root%\DECRYPT_INSTRUCTION.URL
- %Desktop%\DECRYPT_INSTRUCTION.TXT
- %Desktop%\DECRYPT_INSTRUCTION.HTML
- %Desktop%\DECRYPT_INSTRUCTION.URL
- %User Startup%\DECRYPT_INSTRUCTION.TXT
- %User Startup%\DECRYPT_INSTRUCTION.HTML
- %User Startup%\DECRYPT_INSTRUCTION.URL
- %User Profile%\MetaData\2BF68F4714092295550497DD56F57004
- %User Profile%\Content\2BF68F4714092295550497DD56F57004
- %User Profile%\MetaData\94308059B57B3142E455B38A6EB92015
- %User Profile%\Content\94308059B57B3142E455B38A6EB92015
- %User Temp%\Cab9E.tmp
- %User Temp%\TarA0.tmp
Step 7
Buscar y eliminar estas carpetas
- %User Profile%\CryptnetUrlCache\MetaData
- %User Profile%\Microsoft\CryptnetUrlCache
- %User Profile%\CryptnetUrlCache\Content
Step 8
Reinicie en modo normal y explore el equipo con su producto de live casino online para buscar los archivos identificados como TROJ_CRYPCTB.E En caso de que el producto de live casino online ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta para obtener más información.
Step 9
Restaurar este archivo a partir de una copia de seguridad Solo se pueden restaurar los archivos relacionados con Microsoft. En caso de que este malware/grayware/spyware también haya eliminado archivos relativos a programas que no sean de Microsoft, vuelva a instalar los programas en cuestión en el equipo.
- %Application Data%\Microsoft\Windows Media\9.0\WMSDKNS.DTD
- %User Profile%\Templates\excel.xls
- %User Profile%\Templates\excel4.xls
- %User Profile%\Templates\powerpnt.ppt
- %User Profile%\Templates\quattro.wb2
- %User Profile%\Templates\sndrec.wav
- %User Profile%\Templates\winword.doc
- %User Profile%\Templates\winword2.doc
- %User Profile%\Templates\wordpfct.wpd
Did this description help? Tell us how we did.