マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Win32.Expiro.93

Added to the Dr.Web virus database: 2014-04-29

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\NetDDE] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\MSIServer] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\mnmsrvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\RDSessMgr] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\WmiApSrv] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\VSS] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\TlntSvr] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\idsvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\ClipSrv] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\CiSvc] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\ImapiService] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\dmadmin] 'Start' = '00000002'
  • [<HKLM>\SYSTEM\ControlSet001\Services\COMSysApp] 'Start' = '00000002'
Changes the following executable system files:
  • <SYSTEM32>\vssvc.exe
  • <SYSTEM32>\wbem\wmiapsrv.exe
  • <SYSTEM32>\magnify.exe
  • <SYSTEM32>\ups.exe
  • <SYSTEM32>\scardsvr.exe
  • <SYSTEM32>\smlogsvc.exe
  • <SYSTEM32>\tlntsvr.exe
  • <SYSTEM32>\notepad.exe
  • <SYSTEM32>\mobsync.exe
  • <SYSTEM32>\tourstart.exe
  • <SYSTEM32>\utilman.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
  • <SYSTEM32>\narrator.exe
  • <SYSTEM32>\osk.exe
  • <SYSTEM32>\locator.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
  • <SYSTEM32>\dllhost.exe
  • <SYSTEM32>\dmadmin.exe
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
  • <SYSTEM32>\cisvc.exe
  • <SYSTEM32>\clipsrv.exe
  • <SYSTEM32>\msiexec.exe
  • <SYSTEM32>\netdde.exe
  • <SYSTEM32>\sessmgr.exe
  • <SYSTEM32>\msdtc.exe
  • <SYSTEM32>\imapi.exe
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
  • <SYSTEM32>\mnmsrvc.exe
Infects the following executable files:
  • <SYSTEM32>\wbem\wmiapsrv.exe
  • <SYSTEM32>\magnify.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
  • <SYSTEM32>\vssvc.exe
  • <SYSTEM32>\smlogsvc.exe
  • <SYSTEM32>\tlntsvr.exe
  • <SYSTEM32>\ups.exe
  • <SYSTEM32>\narrator.exe
  • <SYSTEM32>\notepad.exe
  • <SYSTEM32>\mobsync.exe
  • <SYSTEM32>\tourstart.exe
  • %PROGRAM_FILES%\Windows Media Player\wmplayer.exe
  • <SYSTEM32>\osk.exe
  • <SYSTEM32>\utilman.exe
  • %PROGRAM_FILES%\Outlook Express\wab.exe
  • <SYSTEM32>\scardsvr.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
  • <SYSTEM32>\dllhost.exe
  • <SYSTEM32>\dmadmin.exe
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
  • <SYSTEM32>\cisvc.exe
  • <SYSTEM32>\clipsrv.exe
  • <SYSTEM32>\imapi.exe
  • <SYSTEM32>\netdde.exe
  • <SYSTEM32>\sessmgr.exe
  • <SYSTEM32>\locator.exe
  • <SYSTEM32>\msiexec.exe
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
  • <SYSTEM32>\mnmsrvc.exe
  • <SYSTEM32>\msdtc.exe
Malicious functions:
Executes the following:
  • '<SYSTEM32>\imapi.exe'
  • '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {6DA21186-3824-4DE4-8D5C-1117E9FBE9C2} -Comment "NGen Worker Process"
  • '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {C9C2FD65-E195-4A65-8141-D9241555A66A} -Comment "NGen Worker Process"
  • '<SYSTEM32>\dmadmin.exe' /com
  • '<SYSTEM32>\cisvc.exe'
  • '%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe'
  • '%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe'
Modifies file system :
Creates the following files:
  • <SYSTEM32>\wbem\pdcdfgmf.tmp
  • <SYSTEM32>\bbgeiocn.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\diejkiip.tmp
  • <SYSTEM32>\ecfngmod.tmp
  • <SYSTEM32>\ajgpihbe.tmp
  • <SYSTEM32>\hhjbgcpm.tmp
  • <SYSTEM32>\empcllnn.tmp
  • <SYSTEM32>\hpghkjec.tmp
  • <SYSTEM32>\gcoolcjm.tmp
  • <SYSTEM32>\pmanfiog.tmp
  • <SYSTEM32>\cigbmpoc.tmp
  • %PROGRAM_FILES%\Windows Media Player\emkgfafj.tmp
  • <SYSTEM32>\ojlodian.tmp
  • <SYSTEM32>\cfiipmme.tmp
  • %PROGRAM_FILES%\Outlook Express\hkfjcfkm.tmp
  • <SYSTEM32>\jpbljbkp.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\imadckac.tmp
  • <SYSTEM32>\hjkedccg.tmp
  • <SYSTEM32>\gnlnboeo.tmp
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\ofdehnap.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\podikoho.tmp
  • <SYSTEM32>\lckkmcqb.tmp
  • <SYSTEM32>\egngnljh.tmp
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\kmnobaea.tmp
  • <SYSTEM32>\cfipklhf.tmp
  • <SYSTEM32>\cijmiopa.tmp
  • <SYSTEM32>\fdchdgna.tmp
  • <SYSTEM32>\glonfcif.tmp
  • <SYSTEM32>\jgcfmmkc.tmp
  • <SYSTEM32>\oogkfnmi.tmp
  • <SYSTEM32>\mcmcihip.tmp
Deletes the following files:
  • <SYSTEM32>\wbem\pdcdfgmf.tmp
  • <SYSTEM32>\bbgeiocn.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\diejkiip.tmp
  • <SYSTEM32>\ecfngmod.tmp
  • <SYSTEM32>\ajgpihbe.tmp
  • <SYSTEM32>\hhjbgcpm.tmp
  • <SYSTEM32>\empcllnn.tmp
  • <SYSTEM32>\hpghkjec.tmp
  • <SYSTEM32>\gcoolcjm.tmp
  • <SYSTEM32>\pmanfiog.tmp
  • <SYSTEM32>\cigbmpoc.tmp
  • %PROGRAM_FILES%\Windows Media Player\emkgfafj.tmp
  • <SYSTEM32>\ojlodian.tmp
  • <SYSTEM32>\cfiipmme.tmp
  • %PROGRAM_FILES%\Outlook Express\hkfjcfkm.tmp
  • <SYSTEM32>\jpbljbkp.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\imadckac.tmp
  • <SYSTEM32>\hjkedccg.tmp
  • <SYSTEM32>\gnlnboeo.tmp
  • %WINDIR%\Microsoft.NET\Framework\v2.0.50727\ofdehnap.tmp
  • %WINDIR%\Microsoft.NET\Framework\v4.0.30319\podikoho.tmp
  • <SYSTEM32>\lckkmcqb.tmp
  • <SYSTEM32>\egngnljh.tmp
  • <SYSTEM32>\jgcfmmkc.tmp
  • <SYSTEM32>\cfipklhf.tmp
  • <SYSTEM32>\cijmiopa.tmp
  • <SYSTEM32>\fdchdgna.tmp
  • <SYSTEM32>\glonfcif.tmp
  • %WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\kmnobaea.tmp
  • <SYSTEM32>\oogkfnmi.tmp
  • <SYSTEM32>\mcmcihip.tmp
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Shell_TrayWnd' WindowName: '(null)'