Send us feedback
We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Esfury.W
Aliases: Win32/Injector.TCI (ESET) Trojan.Siggen4.10925 (Dr.Web) Trojan-Ransom.Win32.ZedoPoo.abn (Kaspersky)
Summary
Worm:Win32/Esfury.W is a worm that spreads via removable drives. The worm modifies the Hosts file and a number of security settings, and also terminates and blocks access to a large number of processes. It may also contact a remote server which may instruct it to download and execute arbitrary files. Worm:Win32/Esfury.W belongs to the Worm:Win32/Esfury family of worms.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:
Disable Autorun functionality
This threat attempts to spread via removable drives on computers that support Autorun functionality. This is a particularly common method of spreading for many current malware families. For information on disabling Autorun functionality, please see the following article:
http://support.microsoft.com/kb/967715/
Additional remediation steps required for Worm:Win32/Esfury.W
The Domain Name System (DNS) is used (among other things) to map domain names to IP addresses - that is, to map human-readable domain names to machine-readable IP addresses. When a user attempts to visit a particular URL, a browser uses DNS servers to find the correct IP address of the requested domain. When a user is directed to a malicious server that is not part of the authoritative Domain Name System, an attacker can provide incorrect IP addresses at their choice to map to particular domain names, thus directing the user to possibly bogus or malicious sites without the affected user's knowledge.
Worm:Win32/Esfury.W may modify DNS settings on the host computer, thus the following steps may be required after its removal is complete.
If the computer has a network interface that does not receive a configuration using DHCP, reset the DNS configuration if necessary. For information on configuring TCP/IP to use DNS, refer to the following:
- For Windows 7: http://windows.microsoft.com/en-US/windows7/Change-TCP-IP-settings
- For Windows Vista: http://windows.microsoft.com/en-US/windows-vista/Change-TCP-IP-settings
- For Windows XP: http://support.microsoft.com/kb/305553
Additional remediation instructions for Worm:Win32/Esfury.W
This threat may make lasting changes to a computer's configuration that are NOT restored by detecting and removing this threat. For more information on returning an infected computer to its pre-infected state, please see the following articles:
- Changing your Internet Explorer Home Page:
- Restoring your system registry:
- For Windows 7
- For Windows Vista
- For Windows XP
- Resetting your computer's security settings to default
- Configuring Security Zone settings for Internet Explorer:
- Changing file associations:
- For Windows 7
- For Windows Vista
- For Windows XP
- Viewing hidden and/or system files:
- For Windows 7
- For Windows Vista
- For Windows XP
- Stopping and starting Windows services:
- For Windows 7
- For Windows Vista
- For Windows XP
- Enabling Task Manager:
- For Windows Vista
- For Windows XP
- Enabling System Restore:
- For Windows 7
- For Windows Vista
- For Windows XP
- Enabling Windows Firewall:
- For Windows 7
- For Windows Vista
- For Windows XP
- Correctly disabling Autorun in Windows
- Recreating a clean Hosts file
Threat behavior
Worm:Win32/Esfury.W is a worm that spreads via removable drives. The worm modifies the Hosts file and a number of security settings, and also terminates and blocks access to a large number of processes. It may also contact a remote server which may instruct it to download and execute arbitrary files. Worm:Win32/Esfury.W belongs to the Worm:Win32/Esfury family of worms.
Installation
When run, Worm:Win32/Esfury.W copies itself to the following location:
%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe, for example, "C:\Documents and Settings\administrator\27f6471627473796e696d64614\winlogon.exe"
Note: %USERPROFILE% refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the User folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>" or "C:\Users\<user>". For Windows Vista and 7, the default location is "C:\Users\<user name>".
Worm:Win32/Esfury.W runs the new copy.
The worm modifies the following entries to ensure that its copy runs at each Windows start:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>"
With data: "<location of malware>" (for example, "C:\Documents and Settings\Administrator\27f6471627473796e696d64614\winlogon.exe")
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>"
With data: "<location of malware>" (for example, "C:\Documents and Settings\Administrator\27f6471627473796e696d64614\winlogon.exe")
Worm:Win32/Esfury.W ensures the worm copy is executed when certain Windows applications are run, including - but not limited to - security products, Registry Editor and Task Manager. It does this by making the following registry modification:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<program name>
Sets value: "Debugger"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe"
where <program name> may be any of the following:
|
_avp.exe |
mwatch.exe mxtask.exe n32scan.exe n32scanw.exe nai_vs_stat.exe nav32_loader.exe nav80try.exe navap.exe navapsvc.exe navapw32.exe navauto-protect.exe navdx.exe naveng.exe navengnavex15.exe navex15.exe navlu32.exe navnt.exe navrunr.exe navsched.exe navstub.exe navw.exe navw32.exe navwnt.exe nc2000.exe ncinst4.exe nd98spst.exe ndd32.exe ndntspst.exe neomonitor.exe neowatchlog.exe netarmor.exe netcfg.exe netinfo.exe netmon.exe netscanpro.exe Netscape.exe netspyhunter-1.2.exe netstat.exe netutils.exe nisserv.exe nisum.exe nmain.exe nod32.exe normist.exe norton_internet_secu_3.0_407.exe notstart.exe npf40_tw_98_nt_me_2k.exe npfmessenger.exe nprotect.exe npscheck.exe npssvc.exe nsched32.exe ntdetect.exe ntrtscan.exe ntxconfig.exe nui.exe nupdate.exe nupgrade.exe nvapsvc.exe nvarch16.exe nvc95.exe nvlaunch.exe nvsvc32.exe nwinst4.exe nwservice.exe nwtool16.exe offguard.exe ogrc.exe opera.exe Opera_964_int_Setup.exe ostronet.exe outpost.exe outpostinstall.exe outpostproinstall.exe padmin.exe panixk.exe pathping.exe pavcl.exe pavproxy.exe pavsched.exe pavw.exe pcc2002s902.exe pcc2k_76_1436.exe pccclient.exe pccguide.exe pcciomon.exe pccmain.exe pccntmon.exe pccpfw.exe pccwin97.exe pccwin98.exe pcdsetup.exe pcfwallicon.exe pcip10117_0.exe pcscan.exe pcscanpdsetup.exe penis32.exe periscope.exe persfw.exe perswf.exe pev.exe pf2.exe pfwadmin.exe ping.exe pingscan.exe platin.exe pop3trap.exe poproxy.exe popscan.exe portdetective.exe portmon.exe portmonitor.exe ppinupdt.exe pptbc.exe ppvstop.exe prckiller.exe Process.exe processmonitor.exe procexp.exe procexplorerv1.0.exe Procmon.exe programauditor.exe proport.exe protectx.exe pspf.exe purge.exe pview.exe pview95.exe qconsole.exe qserver.exe rapapp.exe rav.exe rav7.exe rav7win.exe rav8win32eng.exe realmon.exe regedit.exe regedt32.exe Regmon.exe rescue.exe rescue32.exe Restart.exe route.exe routemon.exe rrguard.exe rshell.exe rstrui.exe rtvscn95.exe rulaunch.exe Safari.exe safeweb.exe SandboxieBITS.exe SandboxieCrypto.exe SandboxieDcomLaunch.exe SandboxieRpcSs.exe SandboxieWUAU.exe SbieCtrl.exe SbieSvc.exe sbserv.exe scan32.exe scan95.exe scanpm.exe sched.exe schedapp.exe scrscan.exe scvhosl.exe sd.exe sdclt.exe serv95.exe setup_flowprotector_us.exe setupvameeval.exe sgssfw32.exe sh.exe sharedaccess.exe shellspyinstall.exe shn.exe shstat.exe smc.exe SmitfraudFix.exe sofi.exe spf.exe sphinx.exe spider.exe spysweeper.exe spyxx.exe SrchSTS.exe srwatch.exe ss3edit.exe st2.exe supftrl.exe supporter5.exe sweep.exe sweep95.exe sweepnet.exe sweepsrv.sys.exe swnetsup.exe swreg.exe swsc.exe swxcacls.exe symproxysvc.exe symtray.exe sysdoc32.exe syshelp.exe taskkill.exe tasklist.exe taskmgr.exe taskmon.exe taumon.exe tauscan.exe tbscan.exe tc.exe tca.exe tcm.exe tcpsvs32.exe tds2.exe tds2-98.exe tds2-nt.exe tds-3.exe tfak.exe tfak5.exe tftpd.exe tgbob.exe titanin.exe titaninxp.exe tmlisten.exe tmntsrv.exe tracerpt.exe tracert.exe trjscan.exe trjsetup.exe trojantrap3.exe UCCLSID.exe UI0Detect.exe undoboot.exe unzip.exe update.exe UserAccountControlSettings.exe VACFix.exe vbcmserv.exe vbcons.exe vbust.exe vbwin9x.exe vbwinntw.exe vccmserv.exe vcleaner.exe vcontrol.exe vcsetup.exe vet32.exe vet95.exe vet98.exe vettray.exe vfsetup.exe vir-help.exe virusmdpersonalfirewall.exe vmsrvc.exe vnlan300.exe vnpc3000.exe vpc32.exe vpc42.exe vpcmap.exe vpfw30s.exe vptray.exe vscan.exe vscan40.exe vscenu6.02d30.exe vsched.exe vsecomr.exe vshwin32.exe vsisetup.exe vsmain.exe vsmon.exe vsscan40.exe vsstat.exe vswin9xe.exe vswinntse.exe vswinperse.exe vvstat.exe w32dsm89.exe w9x.exe watchdog.exe webscan.exe webscanx.exe webtrap.exe WerFault.exe wfindv32.exe wgfe95.exe whoswatchingme.exe wimmun32.exe wingate.exe winhlpp32.exe wink.exe winmgm32.exe winppr32.exe winrecon.exe winroute.exe winservices.exe winsfcm.exe wmias.exe wmiav.exe wnt.exe wradmin.exe wrctrl.exe WS2Fix.exe wsbgate.exe wuauclt.exe wyvernworksfirewall.exe xpf202en.exe xscan.exe zapro.exe zapsetup3001.exe zatutor.exe zatutorzauinst.exe zauinst.exe zlh.exe zonalarm.exe zonalm2601.exe zonealarm.exe |
The worm utilizes code injection in order to hinder detection and removal. When the copy runs, it may inject code into the system process "svchost.exe".
Spreads via…
Removable drives
Worm:Win32/Esfury.W may create the following files on targeted drives when spreading:
- <removable drive>:\subst.lnk - this is a shortcut link that points to the copy of the trojan
- <removable drive>:\<random folder name>\<random file name>.exe - this is a copy of the trojan
- <removable drive>:\<random folder name>\desktop.ini - this file makes the folder appear in Windows Explorer as a recycle bin
- <removable drive>:\<random folder name>\S-1-3-01-4631041401-305419896-464015834-1505\<random file name>.exe - this is a copy of the trojan
- <removable drive>:\<random folder name>\s-1-3-01-4631041401-305419896-464015834-1505\desktop.ini - this file makes the folder appear in Windows Explorer as a recycle bin.
The <random folder name> and <random file name> are each composed of a string of letters and numbers, for example "b00d68fe4b760f8bac2b52ea5eedbb035a93ffa7aa4f05ef013764a731180e9adecf2a0ca5125d604125489ba46451b01135" for the folder name, and "7B14DD0EBE0D10674792C2CF0492E50ED449328463ABC145AAF93063A55250DC1642B5D476B4C13E7C3C8537DBE705256027.exe" for the file name.
It also places an "autorun.inf" file in the root directory of the targeted removable drive. Such files contain execution instructions for the operating system, so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
It should be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation media.
All of these files and directories have their attributes set to "READ ONLY", "HIDDEN", and "SYSTEM".
Payload
Modifies Hosts file
Worm:Win32/Esfury.W modifies the Windows Hosts file. The local Hosts file overrides the DNS resolution of a website URL to a particular IP address. Malicious software may make modifications to the Hosts file in order to redirect specified URLs to different IP addresses. The malware modifies the file in order to redirect specified domains to different IP addresses.
For additional information on DNS, please see the Recovery section in this entry.
The worm hijacks websites and redirects your web browser to a different IP address of the worm’s own choosing, if you attempt to access websites hosted by the following domains:
|
15660808.co.kr |
sea.symantec.com |
Terminates processes
The malware terminates the following processes, which may be related to antimalware software, if they are running on your computer:
- _avpm.exe
- antivirus.exe
- aupdate.exe
- avgw.exe
- avp.exe
- avp32.exe
- avpcc.exe
- blackice.exe
- cmd.exe
- drweb32.exe
- egui.exe
- ekrn.exe
- fsav.exe
- navw32.exe
- nod32.exe
- persfw.exe
- rav.exe
- scan32.exe
- wuauclt.exe
- zonealarm.exe
Modifies system security settings
The malware adds itself to the list of applications that are authorized to access the Internet without being stopped by the firewall, by making the following registry modifications:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-70554750"
In subkey: HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-53342401"
In subkey: HKLM\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-57951861"
In subkey: HKLM\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-28956246"
Modifies system settings
The malware modifies your computer's system settings by making a number of registry modifications.
It disables System Restore:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
Sets value: "DisableSR"
With data: "1"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\sr
Sets value: "Start"
With data: "4"
It disables the use of registry editors:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableRegistryTools"
With data: "0"
It prevents the display of files that have "SYSTEM" and "HIDDEN" attributes:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"
It disables the command prompt:
In subkey: HKCU\Software\Policies\Microsoft\Windows\System
Sets value: "DisableCMD"
With data: "0"
It removes the Run item from the Start menu:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoRun"
With data: "0"
It removes the Folder Options item from all Windows Explorer menus and the Control Panel:
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoFolderOptions"
With data: "0"
Note: Removing access to these options may hinder your ability to detect and remove malware.
It changes the number of programs shown in Task Manager:
In subkey: HKCU\SessionInformation
Sets value: "ProgramCount"
With data: "4"
Modifies Internet browser settings
The malware modifies your computer's default Internet browser and Internet Explorer settings by making a number of registry modifications.
It lowers your Internet security settings:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "Disable Script Debugger"
With data: "yes"
In subkey: HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings
Sets value: "Enabled"
With data: "0"
In subkey: HKCU\SOFTWARE\Microsoft\Windows Script Host\Settings
Sets value: "Enabled"
With data: "0"
It sets the start page for Internet Explorer:
In subkey: HKLM\Software\Microsoft\Internet Explorer\Main
Sets value: "Start Page"
With data: "http://******.directorio-w.com"
In subkey: HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel
Sets value: "HomePage"
With data: "1"
It sets Internet Explorer as the default browser for HTM files and HTTP, HTTPS, and FTP connections:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
Sets value: "Progid"
With data: "ie.assocfile.htm"
In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
Sets value: "Progid"
With data: "ie.http"
In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
Sets value: "Progid"
With data: "ie.https"
In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\ftp\UserChoice
Sets value: "Progid"
With data: "ie.ftp"
In subkey: HKLM\SOFTWARE\Classes\http\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
Note: %ProgramFiles% refers to a variable location that is determined by the malware by querying the operating system. The default location for the Program Files folder for Windows 2000, XP, 2003, Vista and 7 is "C:\Program Files".
In subkey: HKLM\SOFTWARE\Classes\http\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
In subkey: HKLM\SOFTWARE\Classes\https\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
In subkey: HKLM\SOFTWARE\Classes\https\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
In subkey: HKLM\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
In subkey: HKLM\SOFTWARE\Classes\ftp\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"
- hxxp://c.statcounter.com/
- hxxp://whos.amung.us
- hxxp://www.directorio****.com
- hxxp://www.qseach.com
Commonly, malware may contact a remote host for the following purposes:
- To confirm Internet connectivity
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
Additional information
Worm:Win32/Esfury.W creates a mutex named "Global\WindowsUpdateTracingMutex" to ensure that only instance of the worm is running at a time.
Related encyclopedia entries
Analysis by Rex Plantado
Prevention
System changes
The following system changes may indicate the presence of this malware:
- While browsing the Internet, you are redirected to websites that you did not intend to visit
- The presence of the following files:
A esta rubia le gusta.. la carne negra.scr
Debi Diamond Adora el Sexo Oral.scr
Hermosa rubia muy zorra.. y le gusta petear.scr
Hermosas mujeres.. amateurs.scr
Lanny Barbie.. Aqui esta =D.scr
Locura de asiática jojo.. la tiene chiquita y tiernita.scr
Que buen anal! Kaylynn.. se la rebanca.scr
Terrible pete, por terrible pendeja.scr
Vanessa Veracruz ,discretamente de escándalo.scr
<removable drive>:\subst.lnk
<removable drive>:\<random folder name>\S-1-3-01-4631041401-305419896-464015834-1505\<random file name>.exe, for example, "<removable drive>:\b00d68fe4b760f8bac2b52ea5eedbb035a93ffa7aa4f05ef013764a731180e9adecf2a0ca5125d604125489ba46451b01135\S-1-3-01-4631041401-305419896-464015834-1505\7B14DD0EBE0D10674792C2CF0492E50ED449328463ABC145AAF93063A55250DC1642B5D476B4C13E7C3C8537DBE705256027.exe"
<removable drive>:\<random folder name>\s-1-3-01-4631041401-305419896-464015834-1505\desktop.ini - The presence of the following mutex:
Global\WindowsUpdateTracingMutex - The presence of the following registry modifications:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>"
With data: "<location of malware>" (for example, "C:\Documents and Settings\administrator\27f6471627473796e696d64614\winlogon.exe")
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>"
With data: "<location of malware>" (for example, "C:\Documents and Settings\administrator\27f6471627473796e696d64614\winlogon.exe")
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<program name>
Sets value: "Debugger"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-70554750"In subkey: HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-53342401"In subkey: HKLM\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-57951861"In subkey: HKLM\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
Sets value: "%USERPROFILE%\27F6471627473796E696D64614\winlogon.exe"
With data: "%USERPROFILE%\27f6471627473796e696d64614\winlogon.exe:*:enabled:@xpsp2res.dll,-28956246"In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
Sets value: "DisableSR"
With data: "1"In subkey: HKLM\SYSTEM\CurrentControlSet\Services\sr
Sets value: "Start"
With data: "4"In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableRegistryTools"
With data: "0"In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"In subkey: HKCU\Software\Policies\Microsoft\Windows\System
Sets value: "DisableCMD"
With data: "0"In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoRun"
With data: "0"In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Sets value: "NoFolderOptions"
With data: "0"In subkey: HKCU\SessionInformation
Sets value: "ProgramCount"
With data: "4"In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "Disable Script Debugger"
With data: "yes"In subkey: HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings
Sets value: "Enabled"
With data: "0"In subkey: HKCU\SOFTWARE\Microsoft\Windows Script Host\Settings
Sets value: "Enabled"
With data: "0"In subkey: HKLM\Software\Microsoft\Internet Explorer\Main
Sets value: "Start Page"
With data: "http://******.directorio-w.com"In subkey: HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel
Sets value: "HomePage"
With data: "1"In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
Sets value: "Progid"
With data: "ie.assocfile.htm"In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
Sets value: "Progid"
With data: "ie.http"In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
Sets value: "Progid"
With data: "ie.https"In subkey: HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\ftp\UserChoice
Sets value: "Progid"
With data: "ie.ftp"In subkey: HKLM\SOFTWARE\Classes\http\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"In subkey: HKLM\SOFTWARE\Classes\http\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"In subkey: HKLM\SOFTWARE\Classes\https\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"In subkey: HKLM\SOFTWARE\Classes\https\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"In subkey: HKLM\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"In subkey: HKLM\SOFTWARE\Classes\ftp\shell\open\command
Sets value: "<default>"
With data: "%ProgramFiles%\internet explorer\iexplore.exe"