Author: Eleazar Valles   
 Modified By:: Nathaniel Gregory Ragasa

 

Trojan.PSW.Maran (IKARUS)

 PLATFORM:

Windows

 OVER ALL RISK RATING:
 DAMAGE POTENTIAL::
 DISTRIBUTION POTENTIAL::
 REPORTED INFECTION:
 INFORMATION EXPOSURE:
Low
Medium
High
Critical

  • Threat Type:
    Trojan

  • Destructiveness:
    No

  • Encrypted:
    No

  • In the wild::
    Yes

  OVERVIEW

INFECTION CHANNEL: Descargado de Internet, Eliminado por otro tipo de malware

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Elimina archivos para impedir la ejecución correcta de programas y aplicaciones.

Se conecta a determinados sitios Web para enviar y recibir información.

  TECHNICAL DETAILS

File size: 3,954,062 bytes
File type: EXE
Memory resident: Yes
INITIAL SAMPLES RECEIVED DATE: 08 de августа de 2022
PAYLOAD: Connects to URLs/IPs, Modifies system registry, Drops files, Injects processes, Deletes files

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Instalación

Agrega las carpetas siguientes:

  • %User Temp%\is-{Another Random Characters}.tmp → deleted afterwards
  • %User Temp%\is-{Random Characters}.tmp → deleted afterwards
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup → deleted afterwards
  • %ProgramData%\MyGuard
  • %ProgramData%\MyGuard\Log
  • %ProgramData%\MyGuard\Log\Cryptor Plus
  • %Program Files%\CryptorPlus
  • %Common Programs%\Cryptor Plus
  • %System%\CPTEMP
  • %System%\CPTEMP\CryptorPlus → deleted afterwards

(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

. %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).

. %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

)

Infiltra los archivos siguientes:

  • %ProgramData%\MyGuard\Log\Cryptor Plus\{Date that the malware was executed}.log
  • %ProgramData%\MyGuard\CryptorTmp\20220803181356737331\System.zip
  • %ProgramData%\MyGuard\SetupTmp.exe → originally dropped as %ProgramData%\MyGuard\SetupTmp.exe.tmp
  • %System%\is-{Random Characters}.tmp\SetupTmp.tmp → deleted afterwards
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup\_RegDLL.tmp → deleted afterwards
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup\_shfoldr.dll → deleted afterwards
  • %Program Files%\CryptorPlus\unins000.dat
  • %Program Files%\CryptorPlus\unins000.exe → originally dropped as %Program Files%\CryptorPlus\is-{Random Characters}.tmp
  • %System%\msvcr100.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\msvcp100.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ptrwide.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\fmsysotn.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\DeElev.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\elenon.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\MGCrypto.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\DrvOTInj32.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\DrvOTInj64.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\DllOTinj32V2.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ClipLDR32.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\DeShFile.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\GetOPath.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\GetOpath.sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\OpenList.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTAPI.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTAPI64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ClipOTPS.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ClipOTPS64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTCopy.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTCopy64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTPrn.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTPrn64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTPrev.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTPrev64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTFileHelper.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTFile.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\HKOTFile64.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ClipOTPrn.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsHKOT.Sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsHKOT64.sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsHKOTO.sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsHKOT64O.sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\FilesOTUse.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsOTN.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\ItlsinstdrvOT.exe → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\itlsNUOT.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\drivers\ItlsOTN.sys → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\URLGrab.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\MDIOTHook.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\miscfunc.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\AgentComMod.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\Exfn.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %System%\MgCryptoSHA.dll → originally dropped as %System%\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\CPManager.exe → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\Ionic.zip.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\MgNetLib.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\MgNetLog.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\Interop.SHDocVw.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\Interop.TaskScheduler.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\System.Net.Json.dll → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\CPLng.Dat → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Program Files%\CryptroPlus\MyGuardTray.exe → originally dropped as %Program Files%\CryptroPlus\is-{Random Characters}.tmp
  • %Common Programs%\Cryptor Plus\CPManager.lnk
  • %Common Programs%\Cryptor Plus\unins000.lnk

(Nota: %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

. %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

. %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).

)

Agrega los procesos siguientes:

  • "%ProgramData%\MyGuard\SetupTmp.exe" /Silent
  • "%User Temp%\is-{Random Characters}.tmp\SetupTmp.tmp" /SL5="${Random Numbers},{Random Numbers},{Random Numbers},%ProgramData%\MyGuard\SetupTmp.exe" /Silent
  • "cacls" "%ProgramData%\MyGuard" /T /C /E /P Everyone:F
  • "cacls" "%ProgramData%\CryptorPlus" /T /C /E /P Everyone:F
  • "%System%\instdrvOT.Exe"
  • "%Program Files%\CryptorPlus\CPManager.exe"
  • "%Program Files%\CryptorPlus\CPManager.exe" CPEXE
  • "%System%\ClipLDR32.exe "
  • "%Windows%\explorer.exe" %Program Files%\CryptorPlus\MyGuardTray.exe
  • "%System%\DrvOTInj32.Exe" LItlsHKOT/ITLSHKOT.sys/ItlsHKOT64.sys/HKOTAPI.DLL/HKOTAPI64.DLL/*/svchost.exe/

(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

. %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

. %Program Files% es la carpeta Archivos de programa predeterminada, que suele estar en C:\Archivos de programa).

. %Windows% es la carpeta de Windows, que suele estar en C:\Windows o C:\WINNT).

)

Agrega las siguientes exclusiones mutuas para garantizar que solo se ejecuta una de sus copias en todo momento:

  • CPExe Check Mutex

Este malware se inyecta en los siguientes procesos que se ejecutan en la memoria:

  • explorer.exe
  • other running Non-System Applications

Técnica de inicio automático

Se registra como un servicio del sistema para garantizar su ejecución automática cada vez que se inicia el sistema mediante la introducción de las siguientes claves de registro:

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsOTN\Instances
Altitude = 145600.4

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsOTN\Instances
Flags = 0

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsHKOT
Type = 1

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsHKOT
ErrorControl = 0

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsHKOT
Start = 4

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsHKOT
ImagePath = \??\%System%\ITLSHKOT.sys

HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\
services\ItlsOTN\Instances
DefaultInstance = ItIsOTN Instance

Otras modificaciones del sistema

Elimina los archivos siguientes:

  • %User Temp%\is-{Random Characters}.tmp\SetupTmp.tmp
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup\_RegDLL.tmp
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup\_shfoldr.dll

(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

)

Elimina las carpetas siguientes:

  • %User Temp%\is-{Another Random Characters}.tmp\
  • %User Temp%\is-{Another Random Characters}.tmp\_isetup\
  • %System%\CPTEMP\CryptorPlus

(Nota: %User Temp% es la carpeta Temp del usuario activo, que en el caso de Windows 2000(32-bit), XP y Server 2003(32-bit) suele estar en C:\Documents and Settings\{nombre de usuario}\Local Settings\Temp y en el case de Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) y 10(64-bit) en C:\Users\{nombre de usuario}\AppData\Local\Temp).

. %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

)

Agrega las siguientes entradas de registro:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
.cpd
" " = cpdfile

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
cpdfile\shell\cpdopen\
command
" " = %Program Files%\CryptorPlus\CPManager.exe %1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\msvcr100.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\msvcp100.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ptrwide.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\fmsysotn.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\DeElev.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\elenon.dll = 2

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\MGCrypto.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\DrvOTInj32.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\DrvOTInj64.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\DeShFile.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\GetOPath.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\GetOpath.sys = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\OpenList.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTAPI.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTAPI64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ClipOTPS.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ClipOTPS64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTCopy.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTCopy64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTPrn.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTPrn64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTPrn64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTPrev64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTFileHelper.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTFile.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\HKOTFile64.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ClipOTPrn.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ItlsHKOT.Sys = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ItlsHKOT64.Sys = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ItlsHKOTO.sys = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\ItlsHKOT64O.sys = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\FilesOTUse.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\FilesOTUse.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\URLGrab.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\MDIOTHook.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\MDIOTHook.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%System%\MgCryptoSHA.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
Program Files%\CryptroPlus\CPManager.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\Ionic.zip.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\MgNetLib.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\MgNetLog.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\Interop.SHDocVw.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\Interop.TaskScheduler.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\System.Net.Json.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
MyGuard Cryptor PLUS
Templateever = 4.0.1.9

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
Inno Setup: Setup Version = 5.2.3

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
InstallLocation = %Program Files%\CryptorPlus\

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
Inno Setup: Icon Group = Cryptor Plus

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
Inno Setup: User = {User name}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
DisplayIcon = %Program Files%\CryptorPlus\CPManager.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
UninstallString = %Program Files%\CryptorPlus\unins000.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
QuietUninstallString = "%Program Files%\CryptorPlus\unins000.exe" /SILENT

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
Publisher = INZENT, Inc.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
URLInfoAbout = http://www.inzent.com/

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
NoModify = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
NoRepair = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall
InstallDate = {Date Malware Installed}

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
MyGuard Client
SetupTmpVersion = 4.0.1.9

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
MyGuard Client
HKOTAPI.DLL = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\System.Net.Json.dll = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
%Program Files%\CryptroPlus\MyGuardTray.exe = 1

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\SharedDLLs
Inno Setup: App Path = %Program Files%\CryptorPlus

Elimina las siguientes claves de registro:

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
services\ItlsHKOT

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
services\ItlsHKOT\Enum

Otros detalles

Agrega las siguientes entradas de registro como parte de la rutina de instalación:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
.cpd

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
cpdfile

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
cpdfile\shell

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
cpdfile\shell\cdpopen

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
cpdfile\shell\cdpopen\
command

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
MyGuard Client

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
MyGuard Cryptor PLUS

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
OtherInfo

HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
OtherInfo\Injection

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
MyGuard CryptorPlus-Install-Unicode_is1

Se conecta al sitio Web siguiente para enviar y recibir información:

  • http://t2.{BLOCKED}b.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD%2Fyl6nWPkczAQUe1tFz6%2FOy3r9MZIaarbzRutXSFACEHGgtzaV3bGvwjsrmhjuVMs%3D
  • http://tl.{BLOCKED}d.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSFBjxN%2BWY73bfUnSOp7HDKJ%2Fbx0wQUV4abVLi%2BpimK5PbC4hMYiYXN3LcCEEGrqHASLczL8h4qpdWGdb0%3D
  • http://t1.{BLOCKED}b.com/ThawtePCA.crl
  • http://t1.{BLOCKED}b.com/tl.crl

Hace lo siguiente:

  • It will only proceed with its routine if run as administrator.
  • It sends the gathered information to the following URL:
    • http://cowork.{BLOCKED}m.com/cp/approval.do?mod=authUser&{Stolen Information}
    The stolen infomations are:
    • IP Address
    • Mac Address
    • Workgroup
    • Work type
    • Country/Language
    • Computer Name
    • User Name
    • Executed Malware Filename
    • Malware Execution Time
  • It displays the following during execution:

  SOLUTION

Minimum scan engine: 9.800
First VSAPI Pattern File: 17.748.03
First VSAPI Pattern Release Date: 13 de августа de 2022
VSAPI OPR PATTERN-VERSION: 17.748.04
VSAPI OPR PATTERN DATE: 14 de августа de 2022

Step 2

Los usuarios de Windows ME y XP, antes de llevar a cabo cualquier exploración, deben comprobar que tienen desactivada la opción Restaurar sistema para permitir la exploración completa del equipo.

Step 3

Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.

Step 4

Reiniciar en modo seguro

[ learnMore ]

Step 5

Reiniciar en modo seguro y eliminar esta clave del Registro

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este artículo de Microsoft antes de modificar el Registro del equipo.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsOTN\Instances
    • DefaultInstance = ItIsOTN Instance
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsOTN\Instances
    • Altitude = 145600.4
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsOTN\Instances
    • Flags = 0
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsHKOT
    • Type = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsHKOT
    • ErrorControl = 0
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsHKOT
    • Start = 4
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ControlSet001\services\ItlsHKOT
    • ImagePath = \??\%System%\ITLSHKOT.sys

Step 6

Eliminar este valor del Registro

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este artículo de Microsoft antes de modificar el Registro del equipo.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.cpd
    • " " = cpdfile
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cpdfile\shell\cpdopen\command
    • " " = %Program Files%\CryptorPlus\CPManager.exe %1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\msvcr100.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\msvcp100.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ptrwide.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\fmsysotn.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\DeElev.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\elenon.dll = 2
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\MGCrypto.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\DrvOTInj32.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\DrvOTInj64.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\DeShFile.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\GetOPath.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\GetOpath.sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\OpenList.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTAPI.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTAPI64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ClipOTPS.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ClipOTPS64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTCopy.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTCopy64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTPrn.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTPrn64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTPrev.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTPrev64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTFileHelper.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTFile.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\HKOTFile64.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ClipOTPrn.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ItlsHKOT.Sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ItlsHKOT64.Sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ItlsHKOTO.sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ItlsHKOT64O.sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\FilesOTUse.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\ItlsOTN.sys = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\URLGrab.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\MDIOTHook.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\Exfn.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %System%\MgCryptoSHA.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\CPManager.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\Ionic.zip.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\MgNetLib.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\MgNetLog.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\Interop.SHDocVw.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\Interop.TaskScheduler.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\System.Net.Json.dll = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\CPLng.Dat = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
    • %Program Files%\CryptroPlus\MyGuardTray.exe = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\MyGuard Cryptor PLUS
    • Templateever = 4.0.1.9
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • Inno Setup: Setup Version = 5.2.3
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • Inno Setup: App Path = %Program Files%\CryptorPlus\
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • InstallLocation = %Program Files%\CryptorPlus\
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • Inno Setup: Icon Group = Cryptor Plus
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • Inno Setup: User = {User name}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • DisplayIcon = %Program Files%\CryptorPlus\CPManager.exe
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • UninstallString = %Program Files%\CryptorPlus\unins000.exe
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • QuietUninstallString = "%Program Files%\CryptorPlus\unins000.exe" /SILENT
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • Publisher = INZENT, Inc.
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • URLInfoAbout = http://www.inzent.com/
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • NoModify = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • NoRepair = 1
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyGuard CryptorPlus-Install-Unicode_is1
    • InstallDate = {Date Malware Installed}
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\MyGuard Client
    • SetupTmpVersion = 4.0.1.9
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\OtherInfo\Injection
    • HKOTAPI.DLL = 1

Step 7

Eliminar esta clave del Registro

[ learnMore ]

Importante: si modifica el Registro de Windows incorrectamente, podría hacer que el sistema funcione mal de manera irreversible. Lleve a cabo este paso solo si sabe cómo hacerlo o si puede contar con ayuda de su administrador del sistema. De lo contrario, lea este artículo de Microsoft antes de modificar el Registro del equipo.

  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
    • .cpd
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cpdfile\shell\cdpopen\
    • command
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cpdfile\shell\
    • cdpopen
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cpdfile\
    • shell
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
    • cpdfile
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
    • MyGuard Client
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
    • MyGuard Cryptor PLUS
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\OtherInfo\
    • Injection
  • In HKEY_LOCAL_MACHINE\SOFTWARE\ITM System\
    • OtherInfo
  • In HKEY_LOCAL_MACHINE\SOFTWARE\
    • ITM System
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
    • MyGuard CryptorPlus-Install-Unicode_is1

Step 8

Buscar y eliminar estos archivos

[ learnMore ]
Puede que algunos de los archivos del componente estén ocultos. Asegúrese de que tiene activada la casilla Buscar archivos y carpetas ocultos en la opción "Más opciones avanzadas" para que el resultado de la búsqueda incluya todos los archivos y carpetas ocultos.
  • %ProgramData%\MyGuard\Log\Cryptor Plus\{Date that the malware was executed}.log
  • %ProgramData%\MyGuard\CryptorTmp\20220803181356737331\System.zip
  • %ProgramData%\MyGuard\SetupTmp.exe
  • %Program Files%\CryptorPlus\unins000.dat
  • %Program Files%\CryptorPlus\unins000.exe
  • %System%\msvcr100.dll
  • %System%\msvcp100.dll
  • %System%\ptrwide.dll
  • %System%\fmsysotn.exe
  • %System%\DeElev.exe
  • %System%\elenon.dll
  • %System%\MGCrypto.dll
  • %System%\DrvOTInj32.exe
  • %System%\DrvOTInj64.exe
  • %System%\DllOTinj32V2.exe
  • %System%\ClipLDR32.exe
  • %System%\DeShFile.dll
  • %System%\GetOPath.dll
  • %System%\GetOpath.sys
  • %System%\OpenList.exe
  • %System%\HKOTAPI.dll
  • %System%\HKOTAPI64.dll
  • %System%\ClipOTPS.dll
  • %System%\ClipOTPS64.dll
  • %System%\HKOTCopy.dll
  • %System%\HKOTCopy64.dll
  • %System%\HKOTPrn.dll
  • %System%\HKOTPrn64.dll
  • %System%\HKOTPrev.dll
  • %System%\HKOTPrev64.dll
  • %System%\HKOTFileHelper.dll
  • %System%\HKOTFile.dll
  • %System%\HKOTFile64.dll
  • %System%\ClipOTPrn.dll
  • %System%\ItlsHKOT.Sys
  • %System%\ItlsHKOT64.sys
  • %System%\ItlsHKOTO.sys
  • %System%\ItlsHKOT64O.sys
  • %System%\FilesOTUse.dll
  • %System%\ItlsOTN.dll
  • %System%\ItlsinstdrvOT.exe
  • %System%\itlsNUOT.dll
  • %System%\drivers\ItlsOTN.sys
  • %System%\URLGrab.dll
  • %System%\MDIOTHook.dll
  • %System%\miscfunc.dll
  • %System%\AgentComMod.dll
  • %System%\Exfn.dll
  • %System%\MgCryptoSHA.dll
  • %Program Files%\CryptroPlus\CPManager.exe
  • %Program Files%\CryptroPlus\Ionic.zip.dll
  • %Program Files%\CryptroPlus\MgNetLib.dll
  • %Program Files%\CryptroPlus\MgNetLog.dll
  • %Program Files%\CryptroPlus\Interop.SHDocVw.dll
  • %Program Files%\CryptroPlus\Interop.TaskScheduler.dll
  • %Program Files%\CryptroPlus\System.Net.Json.dll
  • %Program Files%\CryptroPlus\CPLng.Dat
  • %Program Files%\CryptroPlus\MyGuardTray.exe
  • %Common Programs%\Cryptor Plus\CPManager.lnk
  • %Common Programs%\Cryptor Plus\unins000.lnk
DATA_GENERIC_FILENAME_1
  • En la lista desplegable Buscar en, seleccione Mi PC y pulse Intro.
  • Una vez haya encontrado el archivo, selecciónelo y, a continuación, pulse MAYÚS+SUPR para eliminarlo definitivamente.
  • Repita los pasos 2 a 4 con el resto de archivos:
      • %ProgramData%\MyGuard\Log\Cryptor Plus\{Date that the malware was executed}.log
      • %ProgramData%\MyGuard\CryptorTmp\20220803181356737331\System.zip
      • %ProgramData%\MyGuard\SetupTmp.exe
      • %Program Files%\CryptorPlus\unins000.dat
      • %Program Files%\CryptorPlus\unins000.exe
      • %System%\msvcr100.dll
      • %System%\msvcp100.dll
      • %System%\ptrwide.dll
      • %System%\fmsysotn.exe
      • %System%\DeElev.exe
      • %System%\elenon.dll
      • %System%\MGCrypto.dll
      • %System%\DrvOTInj32.exe
      • %System%\DrvOTInj64.exe
      • %System%\DllOTinj32V2.exe
      • %System%\ClipLDR32.exe
      • %System%\DeShFile.dll
      • %System%\GetOPath.dll
      • %System%\GetOpath.sys
      • %System%\OpenList.exe
      • %System%\HKOTAPI.dll
      • %System%\HKOTAPI64.dll
      • %System%\ClipOTPS.dll
      • %System%\ClipOTPS64.dll
      • %System%\HKOTCopy.dll
      • %System%\HKOTCopy64.dll
      • %System%\HKOTPrn.dll
      • %System%\HKOTPrn64.dll
      • %System%\HKOTPrev.dll
      • %System%\HKOTPrev64.dll
      • %System%\HKOTFileHelper.dll
      • %System%\HKOTFile.dll
      • %System%\HKOTFile64.dll
      • %System%\ClipOTPrn.dll
      • %System%\ItlsHKOT.Sys
      • %System%\ItlsHKOT64.sys
      • %System%\ItlsHKOTO.sys
      • %System%\ItlsHKOT64O.sys
      • %System%\FilesOTUse.dll
      • %System%\ItlsOTN.dll
      • %System%\ItlsinstdrvOT.exe
      • %System%\itlsNUOT.dll
      • %System%\drivers\ItlsOTN.sys
      • %System%\URLGrab.dll
      • %System%\MDIOTHook.dll
      • %System%\miscfunc.dll
      • %System%\AgentComMod.dll
      • %System%\Exfn.dll
      • %System%\MgCryptoSHA.dll
      • %Program Files%\CryptroPlus\CPManager.exe
      • %Program Files%\CryptroPlus\Ionic.zip.dll
      • %Program Files%\CryptroPlus\MgNetLib.dll
      • %Program Files%\CryptroPlus\MgNetLog.dll
      • %Program Files%\CryptroPlus\Interop.SHDocVw.dll
      • %Program Files%\CryptroPlus\Interop.TaskScheduler.dll
      • %Program Files%\CryptroPlus\System.Net.Json.dll
      • %Program Files%\CryptroPlus\CPLng.Dat
      • %Program Files%\CryptroPlus\MyGuardTray.exe
      • %Common Programs%\Cryptor Plus\CPManager.lnk
      • %Common Programs%\Cryptor Plus\unins000.lnk
  • Step 9

    Buscar y eliminar estas carpetas

    [ learnMore ]
    Asegúrese de que tiene activada la casilla Buscar archivos y carpetas ocultos en la opción Más opciones avanzadas para que el resultado de la búsqueda incluya todas las carpetas ocultas.
    • %ProgramData%\MyGuard\Log\Cryptor Plus
    • %ProgramData%\MyGuard\Log
    • %ProgramData%\MyGuard
    • %Program Files%\CryptorPlus
    • %Common Programs%\Cryptor Plus
    • %System%\CPTEMP

    Step 10

    Reinicie en modo normal y explore el equipo con su producto de Trend Micro para buscar los archivos identificados como Trojan.Win32.INJECTOR.EPLCRM En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.

    Step 11

    Explorar el equipo con su producto de Trend Micro para eliminar los archivos detectados como Trojan.Win32.INJECTOR.EPLCRM En caso de que el producto de Trend Micro ya haya limpiado, eliminado o puesto en cuarentena los archivos detectados, no serán necesarios más pasos. Puede optar simplemente por eliminar los archivos en cuarentena. Consulte esta página de Base de conocimientos para obtener más información.


    Did this description help? Tell us how we did.