Home Forums Windows 7 Security Tips

Windows 7
Windows Vista
Windows XP

Security Tips
Keyboard Shortcuts


Internet Terms
Computer Terms

File Extensions (75)
File Extensions (15K+)

Startup Applications
Necessary Files
Useless Files
At Your Option Files
Dangerous Files
Browser Objects

DLL Files
SYS Files
INF Files
OCX Files
VXD Files

Virus Database
Virus Warnings

Easter Eggs
Tips and Tricks
Hot Downloads

Privacy Policy
Contact Us


Name directs.exe


It's result of the BEAGLE.O or BEAGLE.R or BEAGLE.S or BEAGLE.T Viruses.
W32.Beagle.T@mm is a variant of W32.Beagle.R@mm.
This worm attempts to send an HTML email with various characteristics to the addresses found in the files on an infected computer.
The email does not contain an attachment of the worm. Instead, the HTML email uses the Microsoft Internet Explorer Object Tag Vulnerability
that allows for the automatic download and execution of a file hosted on a remote Web site.
This file is a copy of the worm, but may change in the future.
The worm also opens a backdoor, starts a Web server on port 81 to serve the worm, and attempts to spread through file-sharing networks
by copying itself to folders with "shar" in their names. The worm is also a file infector that appends itself to the .exe files found on the computer.

It does the following:
If the system clock's year is 2006 or later, the worm will do the following:
Deletes the keys:
if the value is present, so that W32.Beagle.T@mm does not restart when you start Windows.

Adds the value: "directs.exe"="%System%\directs.exe"
to the registry key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
Creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
Creates the following files: %System%\directs.exe (a copy of the worm)
%System%\directs.exeopen (a copy of the worm with some random data appended)
Terminates processes, which include antivirus software, processes associated with other worms, and system utilities.

Attempts to delete the some values from the registry keys:

For manual removal, please:
Navigate to the key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
Delete the key: Ru1n
Navigate to the key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
Delete the key: Ru1n

Still have a problem? Ask for help at our discussion forum.

Search Dangerous Files :

: : Recent posts at Forums : :

Gay blogging repair, Everyday photos


Порно фото - глазеть онлайн безмездно

Adult galleries

Open matured galleries

Free galleries

Recent plat

Свежие кулина

Albert Brooks

Experimental Poke out

Matured placement

Callow Poke out

My new website

New plat

State of Affairs

Pictures from social networks

Experimental Protrude

Grown up purlieus

Experimental Protrude



Порно фото. Безмездно смотреть секс порно

Аренда спецте

Social pictures

Вулкан гранд &

Adobe Acrobat PRO DC 2015 [ Mac Os X ] [ UPGRADABLE ] [ FirstKick ] [ nFa ]

Игровые автом

Delivered adult galleries

Design the Web: Graphics and CSS Pseudo-Elements

tyler perrys temptation confessions of a marriage

SoftwareTipsandTricks, All Rights Reserved.