TROJ_DRPR.JKE
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type:
Trojan
Destructiveness:
No
Encrypted:
In the wild::
Yes
OVERVIEW
Elimina archivos para impedir la ejecución correcta de programas y aplicaciones.
TECHNICAL DETAILS
Instalación
Crea las carpetas siguientes:
- %System Root%\DOCUME~1
- %System Root%\DOCUME~1\Wilbert
- %User Profile%\LOCALS~1
- %User Temp%\nsk5.tmp
- %User Temp%\nsh11.tmp
- %Program Files%\Sense
- %User Temp%\nsh11.tmp\extensionData
- %User Temp%\nsh11.tmp\extensionData\plugins
- %User Temp%\nsh11.tmp\extensionData\userCode
(Nota: %System Root% es la carpeta raíz, normalmente C:\. También es la ubicación del sistema operativo).
. %User Profile% es la carpeta de perfil del usuario activo, que en el caso de Windows 98 y ME suele estar en C:\Windows\Profiles\{nombre de usuario}, en el caso de Windows NT en C:\WINNT\Profiles\{nombre de usuario} y en el caso de Windows 2000, XP y Server 2003 en C:\Documents and Settings\{nombre de usuario}).. %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000, XP y Server 2003 suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp).. %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).)Otras modificaciones del sistema
Elimina los archivos siguientes:
- %User Temp%\nsk1.tmp
- %User Temp%\nsk5.tmp
- %User Temp%\nsrD.tmp
- %User Temp%\nsh11.tmp
(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000, XP y Server 2003 suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp).
)Agrega las siguientes entradas de registro como parte de la rutina de instalación:
HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
HKEY_LOCAL_MACHINE\Software\Sense\
Installer
HKEY_LOCAL_MACHINE\Software\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Microsoft\Internet Explorer\Low Rights\
ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
HKEY_CURRENT_USER\Software\Sense
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Update
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Crossrider
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Installer
HKEY_LOCAL_MACHINE\Software\Sense\
IE\Profiles
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Manifest
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Code
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Plugins
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Plugins\207
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Plugins\78
HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\
Sense\Plugins\182
Agrega las siguientes entradas de registro:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
DisplayName = "Sense"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
DisplayIcon = "%Program Files%\Sense\utils.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
DisplayVersion = "1.34.4.10"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
Publisher = "Object Browser"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
CrPublisherId = "20891"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
CrAppId = "48292"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Sense
UninstallString = "%Program Files%\Sense\Uninstall.exe /fcp=1"
HKEY_LOCAL_MACHINE\SOFTWARE\Sense\
Installer
BundledChrome = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Sense\
Installer
BundledFirefox = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Sense\
Installer
BundledIe = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
AppName = "Sense-codedownloader.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
AppPath = "%Program Files%\Sense"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
Policy = "3"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
AppName = "Sense-codedownloader.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
AppPath = "%Program Files%\Sense"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Low Rights\ElevationPolicy\
{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
Policy = "3"
HKEY_CURRENT_USER\Software\Sense
ActiveAppId = "48292"
HKEY_CURRENT_USER\Software\Sense\
Update
LastCheck = "537ef1fb"
HKEY_CURRENT_USER\Software\Crossrider
Bic = "B58B16C4B30240E1B3B57C7622B7B15EIE"
HKEY_CURRENT_USER\Software\Crossrider
Verifier = "2325ea91d32ad264ae97c5dfe9e934e6"
HKEY_CURRENT_USER\Software\Sense\
Installer
Time = "1400828386"
HKEY_CURRENT_USER\Software\Sense\
Installer
StatsDomain = "http://stats.{BLOCKED}demostack.com"
HKEY_CURRENT_USER\Software\Sense\
Installer
ErrorsDomain = "http://errors.{BLOCKED}demostack.com"
HKEY_CURRENT_USER\Software\Sense\
Installer
CodeDownloadDomain = "http://js.{BLOCKED}demostack.com"
HKEY_CURRENT_USER\Software\Sense\
Installer
FullVersion = "1.34.4.10"
HKEY_CURRENT_USER\Software\Sense\
Installer
FullVersionForUrl = "1_34_04_10"
HKEY_CURRENT_USER\Software\Sense\
Installer
SrcId = "000805"
HKEY_CURRENT_USER\Software\Sense\
Installer
SubId = "0"
HKEY_CURRENT_USER\Software\Sense\
Installer
ZData = "0"
HKEY_CURRENT_USER\Software\Sense\
Installer
DefaultBrowser = "ie"
HKEY_CURRENT_USER\Software\Sense\
Installer
OsName = "XP32"
HKEY_CURRENT_USER\Software\Sense\
Installer
Params = "{ source_id : 000805, sub_id : 0, uzid : 0}"
HKEY_LOCAL_MACHINE\SOFTWARE\Sense\
IE\Profiles
S-1-5-21-1645522239-1292428093-682003330-1003 = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Sense\
IE
TotalProfiles = "1"
HKEY_CURRENT_USER\Software\Sense\
Manifest
Name = "Sense"
HKEY_CURRENT_USER\Software\Sense\
Manifest
Manifest = "NA"
HKEY_CURRENT_USER\Software\Sense\
Manifest
Description = "."
HKEY_CURRENT_USER\Software\Sense\
Manifest
PublisherName = "Object Browser"
HKEY_CURRENT_USER\Software\Sense\
Manifest
HomePageUrl = "NA"
HKEY_CURRENT_USER\Software\Sense\
Manifest
RunInFrame = "false"
HKEY_CURRENT_USER\Software\Sense\
Manifest
ThanksUrl = "NA"
HKEY_CURRENT_USER\Software\Sense\
Manifest
DisableIe = "true"
HKEY_CURRENT_USER\Software\Sense\
Manifest
EnableSearchIE = "false"
HKEY_CURRENT_USER\Software\Sense\
Manifest
Version = "51"
HKEY_CURRENT_USER\Software\Sense\
Manifest
UpdateInterval = "168"
HKEY_CURRENT_USER\Software\Sense\
Manifest
BgVersion = "1"
HKEY_CURRENT_USER\Software\Sense\
Manifest
AddressbarURL = "NA"
HKEY_CURRENT_USER\Software\Sense\
Manifest
ChangePrevious = "false"
HKEY_CURRENT_USER\Software\Sense\
Manifest
SetNewTab = "false"
HKEY_CURRENT_USER\Software\Sense\
Manifest
PublisherId = "20891"
HKEY_CURRENT_USER\Software\Sense\
Manifest
ModeType = "production"
HKEY_CURRENT_USER\Software\Sense\
Manifest
PluginsManifestVersion = "47"
HKEY_CURRENT_USER\Software\Sense\
Manifest
IsButtonEnabled = "false"
HKEY_CURRENT_USER\Software\Sense\
Manifest
UninstallerOfferUrl = "NA"
HKEY_CURRENT_USER\Software\Sense\
Manifest
UninstallerOfferAction = "NA"
HKEY_CURRENT_USER\Software\Sense\
Code
AppJavaScript = "{random characters}"
HKEY_CURRENT_USER\Software\Sense\
Code
BgJavaScript = "{random characters}"
HKEY_CURRENT_USER\Software\Sense\
Plugins\207
Version = "2"
HKEY_CURRENT_USER\Software\Sense\
Plugins\207
Name = "dbWrapper"
HKEY_CURRENT_USER\Software\Sense\
Plugins\207
JavaScript = "{random characters}"
HKEY_CURRENT_USER\Software\Sense\
Plugins\207
Url = "http://js.{BLOCKED}demostack.com/plugins/mins/dbWrapper.js"
HKEY_CURRENT_USER\Software\Sense\
Plugins\78
Version = "5"
HKEY_CURRENT_USER\Software\Sense\
Plugins\78
Name = "CrossriderInfo"
HKEY_CURRENT_USER\Software\Sense\
Plugins\78
JavaScript = "{random characters}"
HKEY_CURRENT_USER\Software\Sense\
Plugins\78
Url = "http://js.{BLOCKED}demostack.com/plugins/mins/CrossriderInfo.js"
HKEY_CURRENT_USER\Software\Sense\
Plugins\182
Version = "3"
HKEY_CURRENT_USER\Software\Sense\
Plugins\182
Name = "openUrl"
Rutina de infiltración
Infiltra los archivos siguientes:
- %User Temp%\nsu3.tmp
- %User Temp%\nsk5.tmp\System.dll
- %User Temp%\nsk5.tmp\Aruxgi.tmp
- %User Temp%\nsk5.tmp\WrapperUtils.dll
- %User Temp%\nsk5.tmp\Emgfvamb.exe
- %User Temp%\nsk5.tmp\StdUtils.dll
- %User Temp%\nshF.tmp
- %User Temp%\nsh11.tmp\StdUtils.dll
- %User Temp%\nsh11.tmp\System.dll
- %User Temp%\nsh11.tmp\InstallerUtils2.dll
- %User Temp%\nsh11.tmp\nsisos.dll
- %User Temp%\nsh11.tmp\md5dll.dll
- %User Temp%\nsh11.tmp\UserInfo.dll
- %User Temp%\nsh11.tmp\InstallerUtils.dll
- %User Temp%\nsh11.tmp\inetc.dll
- %User Temp%\nsh11.tmp\update.json
- %Program Files%\Sense\utils.exe
- %User Temp%\nsh11.tmp\42577
- %User Temp%\nsh11.tmp\458347
- %Windows%\Tasks\d4e590bb-8214-4c59-8429-13fb7d7180b5-3.job
- %User Temp%\nsh11.tmp\ExecDos.dll
- %Windows%\Tasks\d4e590bb-8214-4c59-8429-13fb7d7180b5-4.job
- %User Temp%\nsh11.tmp\extensionData\manifest.xml
- %User Temp%\nsh11.tmp\extensionData\plugins.json
- %User Temp%\nsh11.tmp\extensionData\plugins\1.js
- %User Temp%\nsh11.tmp\extensionData\plugins\103.js
- %User Temp%\nsh11.tmp\extensionData\plugins\104.js
- %User Temp%\nsh11.tmp\extensionData\plugins\123.js
- %User Temp%\nsh11.tmp\extensionData\plugins\13.js
- %User Temp%\nsh11.tmp\extensionData\plugins\14.js
- %User Temp%\nsh11.tmp\extensionData\plugins\155.js
- %User Temp%\nsh11.tmp\extensionData\plugins\17.js
- %User Temp%\nsh11.tmp\extensionData\plugins\177.js
- %User Temp%\nsh11.tmp\extensionData\plugins\180.js
- %User Temp%\nsh11.tmp\extensionData\plugins\182.js
- %User Temp%\nsh11.tmp\extensionData\plugins\183.js
- %User Temp%\nsh11.tmp\extensionData\plugins\184.js
- %User Temp%\nsh11.tmp\extensionData\plugins\192.js
- %User Temp%\nsh11.tmp\extensionData\plugins\193.js
- %User Temp%\nsh11.tmp\extensionData\plugins\195.js
- %User Temp%\nsh11.tmp\extensionData\plugins\2.js
- %User Temp%\nsh11.tmp\extensionData\plugins\207.js
- %User Temp%\nsh11.tmp\extensionData\plugins\21.js
- %User Temp%\nsh11.tmp\extensionData\plugins\211.js
- %User Temp%\nsh11.tmp\extensionData\plugins\22.js
- %User Temp%\nsh11.tmp\extensionData\plugins\220.js
- %User Temp%\nsh11.tmp\extensionData\plugins\223.js
- %User Temp%\nsh11.tmp\extensionData\plugins\226.js
- %User Temp%\nsh11.tmp\extensionData\plugins\230.js
- %User Temp%\nsh11.tmp\extensionData\plugins\233.js
- %User Temp%\nsh11.tmp\extensionData\plugins\239.js
- %User Temp%\nsh11.tmp\extensionData\plugins\242.js
- %User Temp%\nsh11.tmp\extensionData\plugins\244.js
- %User Temp%\nsh11.tmp\extensionData\plugins\246.js
- %User Temp%\nsh11.tmp\extensionData\plugins\28.js
- %User Temp%\nsh11.tmp\extensionData\plugins\3.js
- %User Temp%\nsh11.tmp\extensionData\plugins\35.js
- %User Temp%\nsh11.tmp\extensionData\plugins\36.js
- %User Temp%\nsh11.tmp\extensionData\plugins\37.js
- %User Temp%\nsh11.tmp\extensionData\plugins\38.js
- %User Temp%\nsh11.tmp\extensionData\plugins\39.js
- %User Temp%\nsh11.tmp\extensionData\plugins\4.js
- %User Temp%\nsh11.tmp\extensionData\plugins\40.js
- %User Temp%\nsh11.tmp\extensionData\plugins\41.js
- %User Temp%\nsh11.tmp\extensionData\plugins\42.js
- %User Temp%\nsh11.tmp\extensionData\plugins\43.js
- %User Temp%\nsh11.tmp\extensionData\plugins\44.js
- %User Temp%\nsh11.tmp\extensionData\plugins\45.js
- %User Temp%\nsh11.tmp\extensionData\plugins\46.js
- %User Temp%\nsh11.tmp\extensionData\plugins\47.js
- %User Temp%\nsh11.tmp\extensionData\plugins\64.js
- %User Temp%\nsh11.tmp\extensionData\plugins\7.js
- %User Temp%\nsh11.tmp\extensionData\plugins\72.js
- %User Temp%\nsh11.tmp\extensionData\plugins\78.js
- %User Temp%\nsh11.tmp\extensionData\plugins\9.js
- %User Temp%\nsh11.tmp\extensionData\plugins\91.js
- %User Temp%\nsh11.tmp\extensionData\plugins\93.js
- %User Temp%\nsh11.tmp\extensionData\plugins\94.js
- %User Temp%\nsh11.tmp\extensionData\userCode\background.js
- %User Temp%\nsh11.tmp\extensionData\userCode\extension.js
(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000, XP y Server 2003 suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp).
. %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).. %Windows% es la carpeta de Windows, que suele estar en C:\Windows o C:\WINNT).)
SOLUTION
Step 1
Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.
Step 2
Eliminar esta clave del Registro
Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este artículo de Microsoft antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall
- Sense
- In HKEY_LOCAL_MACHINE\Software\Sense
- Installer
- In HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy
- {3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy
- {3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- In HKEY_CURRENT_USER\Software
- Sense
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense
- Update
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software
- Crossrider
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense
- Installer
- In HKEY_LOCAL_MACHINE\Software\Sense\IE
- Profiles
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense
- Manifest
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense
- Code
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense
- Plugins
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense\Plugins
- 207
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense\Plugins
- 78
- In HKEY_USERS\S-1-5-21-1645522239-1292428093-682003330-1003\Software\Sense\Plugins
- 182
Step 3
Eliminar este valor del Registro
Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este artículo de Microsoft antes de modificar el Registro del equipo.
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- DisplayName = "Sense"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- DisplayIcon = "%Program Files%\Sense\utils.exe"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- DisplayVersion = "1.34.4.10"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- Publisher = "Object Browser"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- CrPublisherId = "20891"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- CrAppId = "48292"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sense
- UninstallString = "%Program Files%\Sense\Uninstall.exe /fcp=1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Sense\Installer
- BundledChrome = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Sense\Installer
- BundledFirefox = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Sense\Installer
- BundledIe = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- AppName = "Sense-codedownloader.exe"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- AppPath = "%Program Files%\Sense"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- Policy = "3"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- AppName = "Sense-codedownloader.exe"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- AppPath = "%Program Files%\Sense"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3db2d8fb-1ad8-4770-b7e8-9cb7496a72ed}
- Policy = "3"
- In HKEY_CURRENT_USER\Software\Sense
- ActiveAppId = "48292"
- In HKEY_CURRENT_USER\Software\Sense\Update
- LastCheck = "537ef1fb"
- In HKEY_CURRENT_USER\Software\Crossrider
- Bic = "B58B16C4B30240E1B3B57C7622B7B15EIE"
- In HKEY_CURRENT_USER\Software\Crossrider
- Verifier = "2325ea91d32ad264ae97c5dfe9e934e6"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- Time = "1400828386"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- StatsDomain = "http://stats.{BLOCKED}demostack.com"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- ErrorsDomain = "http://errors.{BLOCKED}demostack.com"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- CodeDownloadDomain = "http://js.{BLOCKED}demostack.com"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- FullVersion = "1.34.4.10"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- FullVersionForUrl = "1_34_04_10"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- SrcId = "000805"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- SubId = "0"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- ZData = "0"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- DefaultBrowser = "ie"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- OsName = "XP32"
- In HKEY_CURRENT_USER\Software\Sense\Installer
- Params = "{ source_id : 000805, sub_id : 0, uzid : 0}"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Sense\IE\Profiles
- S-1-5-21-1645522239-1292428093-682003330-1003 = "1"
- In HKEY_LOCAL_MACHINE\SOFTWARE\Sense\IE
- TotalProfiles = "1"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- Name = "Sense"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- Manifest = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- Description = "."
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- PublisherName = "Object Browser"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- HomePageUrl = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- RunInFrame = "false"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- ThanksUrl = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- DisableIe = "true"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- EnableSearchIE = "false"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- Version = "51"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- UpdateInterval = "168"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- BgVersion = "1"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- AddressbarURL = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- ChangePrevious = "false"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- SetNewTab = "false"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- PublisherId = "20891"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- ModeType = "production"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- PluginsManifestVersion = "47"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- IsButtonEnabled = "false"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- UninstallerOfferUrl = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Manifest
- UninstallerOfferAction = "NA"
- In HKEY_CURRENT_USER\Software\Sense\Code
- AppJavaScript = "{random characters}"
- In HKEY_CURRENT_USER\Software\Sense\Code
- BgJavaScript = "{random characters}"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\207
- Version = "2"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\207
- Name = "dbWrapper"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\207
- JavaScript = "{random characters}"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\207
- Url = "http://js.{BLOCKED}demostack.com/plugins/mins/dbWrapper.js"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\78
- Version = "5"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\78
- Name = "CrossriderInfo"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\78
- JavaScript = "{random characters}"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\78
- Url = "http://js.{BLOCKED}demostack.com/plugins/mins/CrossriderInfo.js"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\182
- Version = "3"
- In HKEY_CURRENT_USER\Software\Sense\Plugins\182
- Name = "openUrl"
Step 4
Buscar y eliminar estos archivos
- %User Temp%\nsu3.tmp
- %User Temp%\nsk5.tmp\System.dll
- %User Temp%\nsk5.tmp\Aruxgi.tmp
- %User Temp%\nsk5.tmp\WrapperUtils.dll
- %User Temp%\nsk5.tmp\Emgfvamb.exe
- %User Temp%\nsk5.tmp\StdUtils.dll
- %User Temp%\nshF.tmp
- %User Temp%\nsh11.tmp\StdUtils.dll
- %User Temp%\nsh11.tmp\System.dll
- %User Temp%\nsh11.tmp\InstallerUtils2.dll
- %User Temp%\nsh11.tmp\nsisos.dll
- %User Temp%\nsh11.tmp\md5dll.dll
- %User Temp%\nsh11.tmp\UserInfo.dll
- %User Temp%\nsh11.tmp\InstallerUtils.dll
- %User Temp%\nsh11.tmp\inetc.dll
- %User Temp%\nsh11.tmp\update.json
- %Program Files%\Sense\utils.exe
- %User Temp%\nsh11.tmp\42577
- %User Temp%\nsh11.tmp\458347
- %Windows%\Tasks\d4e590bb-8214-4c59-8429-13fb7d7180b5-3.job
- %User Temp%\nsh11.tmp\ExecDos.dll
- %Windows%\Tasks\d4e590bb-8214-4c59-8429-13fb7d7180b5-4.job
- %User Temp%\nsh11.tmp\extensionData\manifest.xml
- %User Temp%\nsh11.tmp\extensionData\plugins.json
- %User Temp%\nsh11.tmp\extensionData\plugins\1.js
- %User Temp%\nsh11.tmp\extensionData\plugins\103.js
- %User Temp%\nsh11.tmp\extensionData\plugins\104.js
- %User Temp%\nsh11.tmp\extensionData\plugins\123.js
- %User Temp%\nsh11.tmp\extensionData\plugins\13.js
- %User Temp%\nsh11.tmp\extensionData\plugins\14.js
- %User Temp%\nsh11.tmp\extensionData\plugins\155.js
- %User Temp%\nsh11.tmp\extensionData\plugins\17.js
- %User Temp%\nsh11.tmp\extensionData\plugins\177.js
- %User Temp%\nsh11.tmp\extensionData\plugins\180.js
- %User Temp%\nsh11.tmp\extensionData\plugins\182.js
- %User Temp%\nsh11.tmp\extensionData\plugins\183.js
- %User Temp%\nsh11.tmp\extensionData\plugins\184.js
- %User Temp%\nsh11.tmp\extensionData\plugins\192.js
- %User Temp%\nsh11.tmp\extensionData\plugins\193.js
- %User Temp%\nsh11.tmp\extensionData\plugins\195.js
- %User Temp%\nsh11.tmp\extensionData\plugins\2.js
- %User Temp%\nsh11.tmp\extensionData\plugins\207.js
- %User Temp%\nsh11.tmp\extensionData\plugins\21.js
- %User Temp%\nsh11.tmp\extensionData\plugins\211.js
- %User Temp%\nsh11.tmp\extensionData\plugins\22.js
- %User Temp%\nsh11.tmp\extensionData\plugins\220.js
- %User Temp%\nsh11.tmp\extensionData\plugins\223.js
- %User Temp%\nsh11.tmp\extensionData\plugins\226.js
- %User Temp%\nsh11.tmp\extensionData\plugins\230.js
- %User Temp%\nsh11.tmp\extensionData\plugins\233.js
- %User Temp%\nsh11.tmp\extensionData\plugins\239.js
- %User Temp%\nsh11.tmp\extensionData\plugins\242.js
- %User Temp%\nsh11.tmp\extensionData\plugins\244.js
- %User Temp%\nsh11.tmp\extensionData\plugins\246.js
- %User Temp%\nsh11.tmp\extensionData\plugins\28.js
- %User Temp%\nsh11.tmp\extensionData\plugins\3.js
- %User Temp%\nsh11.tmp\extensionData\plugins\35.js
- %User Temp%\nsh11.tmp\extensionData\plugins\36.js
- %User Temp%\nsh11.tmp\extensionData\plugins\37.js
- %User Temp%\nsh11.tmp\extensionData\plugins\38.js
- %User Temp%\nsh11.tmp\extensionData\plugins\39.js
- %User Temp%\nsh11.tmp\extensionData\plugins\4.js
- %User Temp%\nsh11.tmp\extensionData\plugins\40.js
- %User Temp%\nsh11.tmp\extensionData\plugins\41.js
- %User Temp%\nsh11.tmp\extensionData\plugins\42.js
- %User Temp%\nsh11.tmp\extensionData\plugins\43.js
- %User Temp%\nsh11.tmp\extensionData\plugins\44.js
- %User Temp%\nsh11.tmp\extensionData\plugins\45.js
- %User Temp%\nsh11.tmp\extensionData\plugins\46.js
- %User Temp%\nsh11.tmp\extensionData\plugins\47.js
- %User Temp%\nsh11.tmp\extensionData\plugins\64.js
- %User Temp%\nsh11.tmp\extensionData\plugins\7.js
- %User Temp%\nsh11.tmp\extensionData\plugins\72.js
- %User Temp%\nsh11.tmp\extensionData\plugins\78.js
- %User Temp%\nsh11.tmp\extensionData\plugins\9.js
- %User Temp%\nsh11.tmp\extensionData\plugins\91.js
- %User Temp%\nsh11.tmp\extensionData\plugins\93.js
- %User Temp%\nsh11.tmp\extensionData\plugins\94.js
- %User Temp%\nsh11.tmp\extensionData\userCode\background.js
- %User Temp%\nsh11.tmp\extensionData\userCode\extension.js
Step 5
Buscar y eliminar estas carpetas
- %System Root%\DOCUME~1
- %System Root%\DOCUME~1\Wilbert
- %User Profile%\LOCALS~1
- %User Temp%\nsk5.tmp
- %User Temp%\nsh11.tmp
- %Program Files%\Sense
- %User Temp%\nsh11.tmp\extensionData
- %User Temp%\nsh11.tmp\extensionData\plugins
- %User Temp%\nsh11.tmp\extensionData\userCode
Step 6
Explorar el equipo con su producto de Trend Micro para eliminar los archivos detectados como TROJ_DRPR.JKE En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.
Did this description help? Tell us how we did.