Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win64.Expiro.108

Added to the Dr.Web virus database: 2014-11-24

Virus description added:

Technical Information

To ensure autorun and distribution
Creates the following services
  • [<HKLM>\System\CurrentControlSet\Services\AdobeARMservice] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v2.0.50727_64] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\COMSysApp] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v4.0.30319_64] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\msiserver] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\ose64] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\Steam Client Service] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\UI0Detect] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\vds] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\VSS] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\wbengine] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\wmiApSrv] 'Start' = '00000002'
Changes the following executable system files
  • %WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe
  • <SYSTEM32>\wbengine.exe
  • <SYSTEM32>\vssvc.exe
  • <SYSTEM32>\vds.exe
  • <SYSTEM32>\ui0detect.exe
  • <SYSTEM32>\sppsvc.exe
  • <SYSTEM32>\snmptrap.exe
  • <SYSTEM32>\msiexec.exe
  • <SYSTEM32>\msdtc.exe
  • <SYSTEM32>\fxssvc.exe
  • %WINDIR%\ehome\ehsched.exe
  • %WINDIR%\syswow64\dllhost.exe
  • %WINDIR%\ehome\ehrecvr.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\mscorsvw.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\syswow64\svchost.exe
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework\v2.0.50727\mscorsvw.exe
  • <SYSTEM32>\alg.exe
  • <SYSTEM32>\wbem\wmiapsrv.exe
  • %WINDIR%\syswow64\msiexec.exe
Infects the following executable files
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\armsvc.exe
  • %CommonProgramFiles(x86)%\steam\steamservice.exe
  • <SYSTEM32>\ui0detect.exe
  • <SYSTEM32>\vds.exe
  • <SYSTEM32>\vssvc.exe
  • <SYSTEM32>\wbengine.exe
  • <SYSTEM32>\wbem\wmiapsrv.exe
  • %APPDATA%\icqm\icq.exe
  • %WINDIR%\syswow64\msiexec.exe
  • %APPDATA%\icqm\icqsetup.exe
  • %ProgramFiles%\internet explorer\iexplore.exe
  • %APPDATA%\mail.ru\agent\magent.exe
  • %APPDATA%\mail.ru\agent\magentsetup.exe
  • %APPDATA%\telegram desktop\telegram.exe
  • %ProgramFiles%\winrar\winrar.exe
  • <SYSTEM32>\sppsvc.exe
  • %ProgramFiles%\windows media player\wmpnetwk.exe
  • <SYSTEM32>\snmptrap.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe
  • <SYSTEM32>\alg.exe
  • %WINDIR%\microsoft.net\framework\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\mscorsvw.exe
  • %WINDIR%\syswow64\svchost.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\mscorsvw.exe
  • <SYSTEM32>\msiexec.exe
  • %WINDIR%\ehome\ehrecvr.exe
  • %WINDIR%\syswow64\dllhost.exe
  • %WINDIR%\ehome\ehsched.exe
  • <SYSTEM32>\fxssvc.exe
  • %ProgramFiles(x86)%\google\update\googleupdate.exe
  • <SYSTEM32>\msdtc.exe
  • %CommonProgramFiles%\microsoft shared\source engine\ose.exe
  • <Drive name for removable media>:\calc.exe
Creates the following files on removable media
  • <Drive name for removable media>:\ncjookla.tmp
Malicious functions
To complicate detection of its presence in the operating system,
blocks the following features:
  • Windows Action Center
Modifies file system
Creates the following files
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\gomiljbe.tmp
  • %CommonProgramFiles(x86)%\steam\mdhglfhk.tmp
  • <SYSTEM32>\chdlomme.tmp
  • <SYSTEM32>\ooghdcgj.tmp
  • <SYSTEM32>\pmhjbkmo.tmp
  • <SYSTEM32>\jamcjhhn.tmp
  • <SYSTEM32>\wbem\aomljmpd.tmp
  • %ProgramFiles%\windows media player\lpfapkmd.tmp
  • %WINDIR%\registration\{02d4b3f1-fd88-11d1-960d-00805fc79235}.{752acc57-e606-4a36-94d9-061b6373ed20}.crmlog
  • %APPDATA%\icqm\gbnjefdh.tmp
  • %APPDATA%\icqm\hefeelng.tmp
  • %ProgramFiles%\internet explorer\hghcklej.tmp
  • %APPDATA%\mail.ru\agent\hhkmblee.tmp
  • %APPDATA%\mail.ru\agent\aiojpnka.tmp
  • %APPDATA%\telegram desktop\neooncej.tmp
  • %ProgramFiles%\winrar\kekifdmg.tmp
  • <SYSTEM32>\dcaqjkbh.tmp
  • %ProgramFiles%\microsoft office\office14\jbchlgnn.tmp
  • <SYSTEM32>\bmhdjgpj.tmp
  • <SYSTEM32>\hcfcnfmn.tmp
  • %WINDIR%\syswow64\macromed\flash\cqpphbgo.tmp
  • <SYSTEM32>\fqhmdgoi.tmp
  • %WINDIR%\microsoft.net\framework\v2.0.50727\gegfdipl.tmp
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\gllpfjib.tmp
  • %WINDIR%\syswow64\fonpefod.tmp
  • %WINDIR%\microsoft.net\framework\v4.0.30319\hgdimncm.tmp
  • <SYSTEM32>\foonknjm.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\knpofpgn.tmp
  • %WINDIR%\ehome\dmcjokdi.tmp
  • %WINDIR%\syswow64\ooiihocc.tmp
  • %WINDIR%\ehome\aohmocpg.tmp
  • <SYSTEM32>\fgkbbgkh.tmp
  • %ProgramFiles(x86)%\google\update\phnlommg.tmp
  • %ProgramFiles%\microsoft office\office14\okpfnbgi.tmp
  • <SYSTEM32>\mifobnan.tmp
  • %CommonProgramFiles%\microsoft shared\source engine\nefboccg.tmp
  • %WINDIR%\syswow64\npfjhkqh.tmp
Deletes the following files
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\gomiljbe.tmp
  • <SYSTEM32>\ooghdcgj.tmp
  • <SYSTEM32>\pmhjbkmo.tmp
  • <SYSTEM32>\jamcjhhn.tmp
  • <SYSTEM32>\wbem\aomljmpd.tmp
  • %WINDIR%\registration\{02d4b3f1-fd88-11d1-960d-00805fc79235}.{70c8e9a1-71ac-4642-8c00-42bb5ae4e409}.crmlog
  • %ProgramFiles%\windows media player\lpfapkmd.tmp
  • %WINDIR%\ehome\dmcjokdi.tmp
  • %APPDATA%\icqm\gbnjefdh.tmp
  • %ProgramFiles%\internet explorer\hghcklej.tmp
  • %APPDATA%\mail.ru\agent\hhkmblee.tmp
  • %APPDATA%\mail.ru\agent\aiojpnka.tmp
  • %APPDATA%\telegram desktop\neooncej.tmp
  • %ProgramFiles%\winrar\kekifdmg.tmp
  • %ProgramFiles%\microsoft office\office14\jbchlgnn.tmp
  • %CommonProgramFiles(x86)%\steam\mdhglfhk.tmp
  • <SYSTEM32>\chdlomme.tmp
  • <SYSTEM32>\dcaqjkbh.tmp
  • <SYSTEM32>\bmhdjgpj.tmp
  • %CommonProgramFiles%\microsoft shared\source engine\nefboccg.tmp
  • <SYSTEM32>\fqhmdgoi.tmp
  • %WINDIR%\microsoft.net\framework\v2.0.50727\gegfdipl.tmp
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\gllpfjib.tmp
  • %WINDIR%\syswow64\fonpefod.tmp
  • %WINDIR%\microsoft.net\framework\v4.0.30319\hgdimncm.tmp
  • <SYSTEM32>\foonknjm.tmp
  • %WINDIR%\syswow64\npfjhkqh.tmp
  • %APPDATA%\icqm\hefeelng.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\knpofpgn.tmp
  • %WINDIR%\ehome\aohmocpg.tmp
  • <SYSTEM32>\fgkbbgkh.tmp
  • %ProgramFiles(x86)%\google\update\phnlommg.tmp
  • %ProgramFiles%\microsoft office\office14\okpfnbgi.tmp
  • <SYSTEM32>\mifobnan.tmp
  • <SYSTEM32>\hcfcnfmn.tmp
  • %WINDIR%\syswow64\macromed\flash\cqpphbgo.tmp
  • %WINDIR%\syswow64\ooiihocc.tmp
  • <Drive name for removable media>:\ncjookla.tmp
Miscellaneous
Executes the following
  • '%WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe'
  • '<SYSTEM32>\dllhost.exe' /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}