マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.Expiro.103

Added to the Dr.Web virus database: 2014-07-21

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\idsvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\ImapiService] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\mnmsrvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\NetDDE] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\MSIServer] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\dmadmin] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\ClipSrv] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\CiSvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\COMSysApp] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
Changes the following executable system files:
  • <SYSTEM32>\mnmsrvc.exe
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
  • <SYSTEM32>\imapi.exe
  • <SYSTEM32>\netdde.exe
  • <SYSTEM32>\msiexec.exe
  • <SYSTEM32>\msdtc.exe
  • <SYSTEM32>\dmadmin.exe
  • <SYSTEM32>\clipsrv.exe
  • <SYSTEM32>\cisvc.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
Infects the following executable files:
  • <SYSTEM32>\mnmsrvc.exe
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
  • <SYSTEM32>\imapi.exe
  • <SYSTEM32>\netdde.exe
  • <SYSTEM32>\msiexec.exe
  • <SYSTEM32>\msdtc.exe
  • <SYSTEM32>\dmadmin.exe
  • <SYSTEM32>\clipsrv.exe
  • <SYSTEM32>\cisvc.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
Malicious functions:
Executes the following:
  • '<SYSTEM32>\dllhost.exe' /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
  • '%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe'
  • '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe'
  • '<SYSTEM32>\cisvc.exe'
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe'
Modifies file system :
Creates the following files:
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\blfcopaj.tmp
  • <SYSTEM32>\kdnniidb.tmp
  • %WINDIR%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{01BD8DFE-F16C-4CB7-8054-1E385374F328}.crmlog
  • <SYSTEM32>\flndhfcf.tmp
  • <SYSTEM32>\bdghclab.tmp
  • <SYSTEM32>\eaplgajg.tmp
  • <SYSTEM32>\iomidkea.tmp
  • <SYSTEM32>\qioagkbd.tmp
  • <SYSTEM32>\jmhgjlag.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\nnoljnen.tmp
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\dimgbhhd.tmp
  • <SYSTEM32>\lqgfkaib.tmp
  • <SYSTEM32>\khffpnpn.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\amgcknol.tmp
Deletes the following files:
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\blfcopaj.tmp
  • <SYSTEM32>\kdnniidb.tmp
  • %WINDIR%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{BF4C4D5C-6924-41E8-9BF1-DCC37DF6F31D}.crmlog
  • <SYSTEM32>\flndhfcf.tmp
  • <SYSTEM32>\bdghclab.tmp
  • <SYSTEM32>\eaplgajg.tmp
  • <SYSTEM32>\iomidkea.tmp
  • <SYSTEM32>\qioagkbd.tmp
  • <SYSTEM32>\jmhgjlag.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\nnoljnen.tmp
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\dimgbhhd.tmp
  • <SYSTEM32>\lqgfkaib.tmp
  • <SYSTEM32>\khffpnpn.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\amgcknol.tmp