directs.exe - Dangerous

directs.exe

Manual removal instructions:

Antivirus Report of directs.exe:
directs.exe Malware
directs.exeDangerous
directs.exeHigh Risk
directs.exe
It's result of the BEAGLE.O or BEAGLE.R or BEAGLE.S or BEAGLE.T Viruses.
W32.Beagle.T@mm is a variant of W32.Beagle.R@mm.
This worm attempts to send an HTML email with various characteristics to the addresses found in the files on an infected computer.
The email does not contain an attachment of the worm. Instead, the HTML email uses the Microsoft Internet Explorer Object Tag Vulnerability
that allows for the automatic download and execution of a file hosted on a remote Web site.
This file is a copy of the worm, but may change in the future.
The worm also opens a backdoor, starts a Web server on port 81 to serve the worm, and attempts to spread through file-sharing networks
by copying itself to folders with "shar" in their names. The worm is also a file infector that appends itself to the .exe files found on the computer.

It does the following:
If the system clock's year is 2006 or later, the worm will do the following:
Deletes the keys:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
if the value is present, so that W32.Beagle.T@mm does not restart when you start Windows.

Adds the value: "directs.exe"="%System%\directs.exe"
to the registry key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
Creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
Creates the following files: %System%\directs.exe (a copy of the worm)
%System%\directs.exeopen (a copy of the worm with some random data appended)
Terminates processes, which include antivirus software, processes associated with other worms, and system utilities.

Attempts to delete the some values from the registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

For manual removal, please:
Navigate to the key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
Delete the key: Ru1n
Navigate to the key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
Delete the key: Ru1n

Remove directs.exe now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.