Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows 98 | Windows ME | Windows NT | Windows Vista | Windows 2012 SHA1 Hash: 5cbef74dd4ef19adcf418d863c295b7151772f4e Size: 31.52 KB File Format: zip
Rating: 2.478260869
out of 5
based on 23 user ratings
Downloads: 1198 License: Free
CodeRed Detection and Removal Tool is a free software by Bitdefender LLC and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows 98, Windows ME, Windows NT, Windows Vista, Windows 2012.
You can download CodeRed Detection and Removal Tool which is 31.52 KB in size and belongs to the software category Removal Tools. CodeRed Detection and Removal Tool was released on 2010-08-02 and last updated on our database on 2017-02-27 and is currently at version 1.
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
CodeRed Detection and Removal Tool Description
CodeRed Detection and Removal Tool is a lightweight utility that targets the Win32.IISWorm.CodeRed.F worm.
The virus exploits a buffer overflow vulnerability in the Microsoft Windows IIS Server, that runs on Microsoft Windows NT and Windows 2000. The patch and information about this problem can be found at the address:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
The worm begins spreading itself by sending HTTP queries. Unpatched machines will execute the worm code directly from memory. Once executed, the worm scans kernel32.dll s export table for the GetProcAddress function and then finds the addresses of the functions needed for further spreading. It then exploits yet another bug in Microsoft Windows, the relative shell path vulnerability.
This particular vulnerability is used to load another shell program instead of the usual explorer.exe (found in %WINDIR%) by writing a file named explorer.exe in the %SYSTEMROOT% directory. The worm checks whether Chinese (either Traditional or Simplified) is the language installed on the system. If it is Chinese, it creates 600 threads and spreads for 48hours. On a non-Chinese system it creates 300 threads and spreads for 24 hours.
After that, it reboots the system using ExitWindowEx function. The worm dumps part of its body to %SYSTEMROOT%explorer.exe, which is in fact a trojan component, allowing the attacker to remotely access the infected computers.
The trojan component modifies the registry key:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable]
to disable file system security and allows a remote attacker to access drives C: and D: via a web browser by adding read/write rights using the registry key:
[HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots]