Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Win64.Expiro.125

Added to the Dr.Web virus database: 2017-11-15

Virus description added:

Technical Information

To ensure autorun and distribution
Sets the following service settings
  • [<HKLM>\System\CurrentControlSet\Services\AdobeARMservice] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v2.0.50727_32] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v2.0.50727_64] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v4.0.30319_32] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\clr_optimization_v4.0.30319_64] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\COMSysApp] 'Start' = '00000002'
Changes the following executable system files
  • %WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe
  • <SYSTEM32>\alg.exe
  • %WINDIR%\syswow64\svchost.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\aspnet_state.exe
  • %WINDIR%\microsoft.net\framework\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\mscorsvw.exe
  • %WINDIR%\syswow64\dllhost.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\ehome\ehrecvr.exe
  • %WINDIR%\ehome\ehsched.exe
  • <SYSTEM32>\fxssvc.exe
Infects the following executable files
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\armsvc.exe
  • %WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe
  • <SYSTEM32>\alg.exe
  • %WINDIR%\syswow64\svchost.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\aspnet_state.exe
  • %WINDIR%\microsoft.net\framework\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\mscorsvw.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\mscorsvw.exe
  • %WINDIR%\syswow64\dllhost.exe
  • <SYSTEM32>\dllhost.exe
  • %WINDIR%\ehome\ehrecvr.exe
  • %WINDIR%\ehome\ehsched.exe
  • <SYSTEM32>\fxssvc.exe
  • %ProgramFiles(x86)%\google\update\googleupdate.exe
Modifies file system
Creates the following files
  • %TEMP%\jafqiffag-20201206-2020.log
  • %WINDIR%\ehome\plcnblpl.tmp
  • %WINDIR%\ehome\bpkhibgh.tmp
  • <SYSTEM32>\hfmcfebg.tmp
  • %WINDIR%\syswow64\aqkjdhde.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\hlbaqbqh.tmp
  • %WINDIR%\microsoft.net\framework\v4.0.30319\fkmnmhmd.tmp
  • <SYSTEM32>\cgnadpka.tmp
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\abkkfjfj.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\ndmkjioc.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\pfgbqhfm.tmp
  • %WINDIR%\syswow64\ofghgcck.tmp
  • <SYSTEM32>\ncpadllo.tmp
  • %WINDIR%\syswow64\macromed\flash\eqbfcfnc.tmp
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\pmnegeof.tmp
  • %WINDIR%\microsoft.net\framework\v2.0.50727\ebfikeoa.tmp
  • %ProgramFiles(x86)%\google\update\dnkobbda.tmp
Deletes the following files
  • %CommonProgramFiles(x86)%\adobe\arm\1.0\pmnegeof.tmp
  • %WINDIR%\syswow64\macromed\flash\eqbfcfnc.tmp
  • <SYSTEM32>\ncpadllo.tmp
  • %WINDIR%\syswow64\ofghgcck.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\pfgbqhfm.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\ndmkjioc.tmp
  • %WINDIR%\microsoft.net\framework\v2.0.50727\ebfikeoa.tmp
  • %WINDIR%\microsoft.net\framework64\v2.0.50727\abkkfjfj.tmp
  • %WINDIR%\microsoft.net\framework\v4.0.30319\fkmnmhmd.tmp
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\hlbaqbqh.tmp
  • %WINDIR%\syswow64\aqkjdhde.tmp
  • <SYSTEM32>\hfmcfebg.tmp
  • %WINDIR%\ehome\bpkhibgh.tmp
  • %WINDIR%\ehome\plcnblpl.tmp
  • <SYSTEM32>\cgnadpka.tmp
  • %ProgramFiles(x86)%\google\update\dnkobbda.tmp
Network activity
TCP
  • 'ne#######s.officeapps.live.com':443
UDP
  • DNS ASK ne#######s.officeapps.live.com
Miscellaneous
Executes the following
  • '%WINDIR%\syswow64\macromed\flash\flashplayerupdateservice.exe'