SoftwareTipsandTricks.com
Home Forums Windows 7 Security Tips
Forums

Windows 7
Windows Vista
Windows XP

Security Tips
Troubleshooting
Keyboard Shortcuts
Encyclopedia


Drivers

Internet Terms
Computer Terms

File Extensions (75)
File Extensions (15K+)

Startup Applications
Necessary Files
Useless Files
At Your Option Files
Dangerous Files
Browser Objects

DLL Files
SYS Files
INF Files
OCX Files
VXD Files

Virus Database
Virus Warnings

Easter Eggs
Tips and Tricks
Articles
Hot Downloads


Privacy Policy
Contact Us







  svdhost32.exe

Name svdhost32.exe

Description

W32.Gaobot.ZW is a minor variant of W32.Gaobot.SY.
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
Attempts to terminate processes related with some antivirus software.

The worm uses multiple vulnerabilities to spread, including:
- The Microsoft Messenger Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-043).
- The Locator service vulnerability (described in Microsoft Security Bulletin MS03-001) using TCP port 445.
The worm specifically targets Windows 2000 machines using this exploit.
- The UPnP vulnerability (described in Microsoft Security Bulletin MS01-059).
- The vulnerabilities in the Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061), using UDP port 1434.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.

Copies itself as %System%\svdhost32.exe.

Adds the value: "Hotfix Updat"="svdhost32.exe"
to the registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

Deletes the values: "Ssate.exe"; "rate.exe"; "d3dupdate.exe"; "TaskMon"; "Explorer"
from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Terminates the following processes: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Deletes the following files: %System%\irun4.exe; %System%\i11r54n4.exe; %System%\winsys.exe; %System%\bbeagle.exe; %System%\taskmon.exe
Deletes the service, upnphost.
Adds the following lines to the %System%\drivers\etc\hosts file, so that any attempts to connect to some antivirus Web sites fail.

Remove it automatically from startup by antivirus (also check How To Remove section)Startup Optimizer.


Still have a problem? Ask for help at our discussion forum.



Search Dangerous Files :
 

: : Recent posts at Forums : :

duycmuipja

fpjypvueau

rtstflbicu

lmxfxnljvu

xqjtysdayi

lysijnzwya

ilqwmhrcsp

Интересные но

Порно фото галереи, более 500 тысяч фотограф&#

liautoymde

guhbbkvwpr

cndknwizdh

Experimental Job

huujarfwtg

wirjgyvhdo

wmmdercpug

cfxuprkoxm

Downscale GoPro Hero 4K Video to 1080p

New Poke out

nsxgajvhbf

uylfdgcqwk

lyzihbvwvv

Social pictures

zplummjylt

ugcxqnfgdo

dmgtpuoexd

дом и семья

irzvqhtstz

fbsgtsjqin

lwfuhhdwie




SoftwareTipsandTricks, All Rights Reserved.