Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Win32.Expiro.72
Added to the Dr.Web virus database:
2014-01-17
Virus description added:
2014-01-24
Technical Information
To ensure autorun and distribution:
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\NetDDE] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\MSIServer] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\mnmsrvc] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\RDSessMgr] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\WmiApSrv] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\VSS] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\TlntSvr] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\ClipSrv] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\CiSvc] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\ImapiService] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\idsvc] 'Start' = '00000002'
[<HKLM>\SYSTEM\ControlSet001\Services\dmadmin] 'Start' = '00000002'
Changes the following executable system files:
<SYSTEM32>\locator.exe
<SYSTEM32>\scardsvr.exe
<SYSTEM32>\netdde.exe
<SYSTEM32>\sessmgr.exe
<SYSTEM32>\smlogsvc.exe
<SYSTEM32>\wbem\wmiapsrv.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
<SYSTEM32>\tlntsvr.exe
<SYSTEM32>\vssvc.exe
<SYSTEM32>\msiexec.exe
<SYSTEM32>\clipsrv.exe
%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
<SYSTEM32>\cisvc.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
<SYSTEM32>\imapi.exe
<SYSTEM32>\mnmsrvc.exe
<SYSTEM32>\dmadmin.exe
%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
Infects the following executable files:
<SYSTEM32>\locator.exe
<SYSTEM32>\scardsvr.exe
<SYSTEM32>\netdde.exe
<SYSTEM32>\sessmgr.exe
<SYSTEM32>\smlogsvc.exe
<SYSTEM32>\wbem\wmiapsrv.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
<SYSTEM32>\tlntsvr.exe
<SYSTEM32>\vssvc.exe
<SYSTEM32>\msiexec.exe
<SYSTEM32>\clipsrv.exe
%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
<SYSTEM32>\cisvc.exe
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
<SYSTEM32>\imapi.exe
<SYSTEM32>\mnmsrvc.exe
<SYSTEM32>\dmadmin.exe
%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
Malicious functions:
Executes the following:
'%WINDIR%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe'
'<SYSTEM32>\cisvc.exe'
Modifies file system :
Creates the following files:
<SYSTEM32>\dpmfeoek.tmp
<SYSTEM32>\agfhbgaf.tmp
<SYSTEM32>\gnmndhma.tmp
<SYSTEM32>\mkopncki.tmp
<SYSTEM32>\omhfnjjm.tmp
<SYSTEM32>\wbem\fecollam.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\pgcpibpo.tmp
<SYSTEM32>\nkeadnon.tmp
<SYSTEM32>\fopakmli.tmp
<SYSTEM32>\gbocljod.tmp
<SYSTEM32>\feklmmjd.tmp
%WINDIR%\Microsoft.NET\Framework\v2.0.50727\ndaoldfb.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\lkjimpak.tmp
<SYSTEM32>\hoejdbip.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\pdacbaok.tmp
<SYSTEM32>\kdfhjbha.tmp
<SYSTEM32>\phbghpgp.tmp
<SYSTEM32>\hpgmpmmm.tmp
%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\naomhdjq.tmp
Deletes the following files:
<SYSTEM32>\dpmfeoek.tmp
<SYSTEM32>\agfhbgaf.tmp
<SYSTEM32>\gnmndhma.tmp
<SYSTEM32>\mkopncki.tmp
<SYSTEM32>\omhfnjjm.tmp
<SYSTEM32>\wbem\fecollam.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\WPF\pgcpibpo.tmp
<SYSTEM32>\nkeadnon.tmp
<SYSTEM32>\fopakmli.tmp
<SYSTEM32>\gbocljod.tmp
<SYSTEM32>\feklmmjd.tmp
%WINDIR%\Microsoft.NET\Framework\v2.0.50727\ndaoldfb.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\lkjimpak.tmp
<SYSTEM32>\hoejdbip.tmp
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\pdacbaok.tmp
<SYSTEM32>\kdfhjbha.tmp
<SYSTEM32>\phbghpgp.tmp
<SYSTEM32>\hpgmpmmm.tmp
%WINDIR%\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\naomhdjq.tmp
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK