videodrv.exe - Dangerous
videodrv.exe
Manual removal instructions:
Antivirus Report of videodrv.exe:
videodrv.exe
I-Worm.Mimail
Mimail is an internet worm spreading via infected emails. The worm uses a built in SMTP engine.
Infected messages has the following fields:
From: admin@%fake email address% where %fake email address% is different every time.
Subject: your account %rnd str% where %rnd str% is different every time.
Body:
Hello there, I would like to inform you about important information regarding your email address. This email address will be expiring.
Please read attachment for details.
---
Best regards, Administrator
---
Attach: message.zip with "message.html" file.
This HTML file drops the FOO.EXE file (worm copy) into the "Downloaded Program Files" directory and runs it.
(To do this action the worm exploits a vulnerability in Internet Explorer: allows a Java script in the HTML file to get access to disk files without any prompts.)
Worm copies itself to the Windows directory under the name "videodrv.exe" and registers this file in the system registry autorun key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
VideoDriver = %WinDir%\videodrv.exe
The worm also creates the following files in the Windows directory:
exe.tmp - worm in HTML file
zip.tmp - worm's HTML file in ZIP archive (method "stored" - no compression).
eml.tmp - list of emails found on infected machine
(The worm uses its own ZIP file format supporting routine.)
Use RegRun Startup Optimizer to remove it from startup.
videodrv.exe | Malware |
videodrv.exe | Dangerous |
videodrv.exe | High Risk |
Mimail is an internet worm spreading via infected emails. The worm uses a built in SMTP engine.
Infected messages has the following fields:
From: admin@%fake email address% where %fake email address% is different every time.
Subject: your account %rnd str% where %rnd str% is different every time.
Body:
Hello there, I would like to inform you about important information regarding your email address. This email address will be expiring.
Please read attachment for details.
---
Best regards, Administrator
---
Attach: message.zip with "message.html" file.
This HTML file drops the FOO.EXE file (worm copy) into the "Downloaded Program Files" directory and runs it.
(To do this action the worm exploits a vulnerability in Internet Explorer: allows a Java script in the HTML file to get access to disk files without any prompts.)
Worm copies itself to the Windows directory under the name "videodrv.exe" and registers this file in the system registry autorun key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
VideoDriver = %WinDir%\videodrv.exe
The worm also creates the following files in the Windows directory:
exe.tmp - worm in HTML file
zip.tmp - worm's HTML file in ZIP archive (method "stored" - no compression).
eml.tmp - list of emails found on infected machine
(The worm uses its own ZIP file format supporting routine.)
Use RegRun Startup Optimizer to remove it from startup.
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.