JavaScript support is required for our site to be fully operational in your browser.
Win32.Expiro.66
Added to the Dr.Web virus database:
2013-10-19
Virus description added:
2013-10-19
Technical Information
To ensure autorun and distribution:
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\RDSessMgr] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\NetDDE] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\MSIServer] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\WmiApSrv] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\VSS] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\TlntSvr] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\ImapiService] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\ClipSrv] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\CiSvc] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\idsvc] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\dmadmin] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
Infects the following executable system files:
<SYSTEM32>\mstsc.exe
<SYSTEM32>\calc.exe
<SYSTEM32>\sndvol32.exe
<SYSTEM32>\sndrec32.exe
<SYSTEM32>\accwiz.exe
<SYSTEM32>\osk.exe
<SYSTEM32>\narrator.exe
<SYSTEM32>\mobsync.exe
<SYSTEM32>\utilman.exe
<SYSTEM32>\sol.exe
<SYSTEM32>\mshearts.exe
<SYSTEM32>\wupdmgr.exe
<SYSTEM32>\spider.exe
<SYSTEM32>\odbcad32.exe
<SYSTEM32>\ntbackup.exe
<SYSTEM32>\mspaint.exe
<SYSTEM32>\Restore\rstrui.exe
<SYSTEM32>\usmt\migwiz.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
<SYSTEM32>\dmadmin.exe
<SYSTEM32>\msiexec.exe
<SYSTEM32>\imapi.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
<SYSTEM32>\cisvc.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
<SYSTEM32>\clipsrv.exe
<SYSTEM32>\vssvc.exe
<SYSTEM32>\tlntsvr.exe
<SYSTEM32>\magnify.exe
<SYSTEM32>\wbem\wmiapsrv.exe
<SYSTEM32>\smlogsvc.exe
<SYSTEM32>\sessmgr.exe
<SYSTEM32>\netdde.exe
<SYSTEM32>\scardsvr.exe
<SYSTEM32>\locator.exe
Malicious functions:
Executes the following:
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {03F2ADFA-D5E4-47E6-985E-F99B9D04584A} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {6E4D6CF6-058F-466C-B8F7-D7AC7E71C87D} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {6918F8C1-ED0A-4744-817E-A901374497CF} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {B2F1A38B-7ED0-4468-8701-5D7D2AF45998} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {116309D9-2A80-461F-9EE7-87BA11D5FF15} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {AA867BBF-C095-41DE-A287-C5EB1783B53D} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {685C11AB-A8B6-44E0-B4DD-4108E2450A8F} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {21B20114-4028-4D82-B495-E8AFBC4171E1} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {10051359-5022-4544-8868-1EE474190A5B} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {6B83BF96-DA3E-4445-89A9-444C7999D060} -Comment "NGen Worker Process"
'<SYSTEM32>\dmadmin.exe' /com
'%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe'
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe'
'<SYSTEM32>\cisvc.exe'
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe'
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {9EB71F3E-A79C-4077-9CF4-4AC16E2EEAB1} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {A7EC16DB-9F9E-474A-B323-51DCD71D65FA} -Comment "NGen Worker Process"
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {DFD56B71-D843-4FFD-931F-2874A816DEF9} -Comment "NGen Worker Process"
'<SYSTEM32>\vssvc.exe'
'%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe' -UseCLSID {5974FDE9-650C-42B7-92FC-CDB1A3D2B0B0} -Comment "NGen Worker Process"
Modifies settings of Windows Internet Explorer:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '2103' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '2103' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '2103' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '2103' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2] '1406' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '1609' = '00000000'
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1] '2103' = '00000000'
Miscellaneous:
Searches for the following windows:
ClassName: 'Shell_TrayWnd' WindowName: '(null)'
ClassName: 'SysListView32' WindowName: '(null)'
欢迎下载 Dr.Web for Android
免费3个月
可使用所有保护组件
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息
OK