WWD.EXE is Worm Shakblades

March 27, 2012 by NightWatcher
Filed under: Worm 
: Solved!

You should Download Removal Tool here...

The file WWD.EXE is a computer worm.
The worm WWD.EXE is a self-replicating malicious program,
which uses a computer network to send copies of itself to other computers.
You must fix the WWD.EXE problem as soon as possible!
Delete the file WWD.EXE from all infected computers in your network.
Set up your network firewall against WWD.EXE intervention.

Malware Analysis of WWD.EXE
Full path on a computer: %Appdata%\WWD.exe

Detected by UnHackMe:

Item Name: WindowsUpdater
Author: Unknown
Related File: %APPDATA%\WWD.EXE
Type: Explorer Run

Item Name: {E7ABC46C-CB7B-17F8-5DB0-8B1E4AADB6E1}
Author: Unknown
Related File: %APPDATA%\WWD.EXE
Type: ActiveSetup

Item Name: WWD.exe
Author: Unknown
Related File: %APPDATA%\WWD.EXE
Type: Detected using Heuristic Algorithm

Removal Results: Success
Number of reboot: 1

WWD.EXE is known as:

Worm.Shakblades, Worm.Ainslot

WWD.EXE hash:

  • MD5: a04c16b3f70ad263d291b311861920a3
How to quickly detect WWD.EXE presence?

Registry:
  • HKLM\Software\Microsoft\Active Setup\Installed Components\{E7ABC46C-CB7B-17F8-5DB0-8B1E4AADB6E1}\StubPath: “%Appdata%\WWD.exe”
  • HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\run\WindowsUpdater: “%Appdata%\WWD.exe”
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater: “%Appdata%\WWD.exe”
  • HKCU\Software\Microsoft\Active Setup\Installed Components\{E7ABC46C-CB7B-17F8-5DB0-8B1E4AADB6E1}\StubPath: “%Appdata%\WWD.exe”
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater: “%Appdata%\WWD.exe”
Files:
  • %Appdata%\WORKING
  • %Appdata%\WWD.exe
  • %Temp%\w3JE1hoL79.exe
  • %Temp%\WWD.exe


Recommended: UnHackMe anti-rootkit and anti-malware

Premium software: RegRun Security Suite (Good choice for removal and protection)

Written by

Malware Hunter.

Comments

Tell me what you're thinking...
and oh, if you want a pic to show with your comment, go get a gravatar!

You must be logged in to post a comment.