CodeRed Detection and Removal Tool icon

CodeRed Detection and Removal Tool

2 big stars
CodeRed Detection and Removal Tool screenshot
Name: CodeRed Detection and Removal Tool
Works on: windowsWindows NT and above
Developer: Bitdefender LLC
Version: 1
Last Updated: 27 Feb 2017
Release: 02 Aug 2010
Category: Antivirus > Removal Tools
Rate this software:
1136 downloads
screenshotsView Screenshots(1)
commentsComments
downloadDownload
Liked it? Tell others:
details

CodeRed Detection and Removal Tool Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows 98 | Windows ME | Windows NT | Windows Vista | Windows 2012
SHA1 Hash: 5cbef74dd4ef19adcf418d863c295b7151772f4e
Size: 31.52 KB
File Format: zip
Rating: 2.478260869 out of 5 based on 23 user ratings
Downloads: 1136
License: Free
CodeRed Detection and Removal Tool is a free software by Bitdefender LLC and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows 98, Windows ME, Windows NT, Windows Vista, Windows 2012.
You can download CodeRed Detection and Removal Tool which is 31.52 KB in size and belongs to the software category Removal Tools.
CodeRed Detection and Removal Tool was released on 2010-08-02 and last updated on our database on 2017-02-27 and is currently at version 1.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

CodeRed Detection and Removal Tool Description

CodeRed Detection and Removal Tool is a lightweight utility that targets the Win32.IISWorm.CodeRed.F worm.
The virus exploits a buffer overflow vulnerability in the Microsoft Windows IIS Server, that runs on Microsoft Windows NT and Windows 2000. The patch and information about this problem can be found at the address:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
The worm begins spreading itself by sending HTTP queries. Unpatched machines will execute the worm code directly from memory. Once executed, the worm scans kernel32.dll s export table for the GetProcAddress function and then finds the addresses of the functions needed for further spreading. It then exploits yet another bug in Microsoft Windows, the relative shell path vulnerability.
This particular vulnerability is used to load another shell program instead of the usual explorer.exe (found in %WINDIR%) by writing a file named explorer.exe in the %SYSTEMROOT% directory. The worm checks whether Chinese (either Traditional or Simplified) is the language installed on the system. If it is Chinese, it creates 600 threads and spreads for 48hours. On a non-Chinese system it creates 300 threads and spreads for 24 hours.
After that, it reboots the system using ExitWindowEx function. The worm dumps part of its body to %SYSTEMROOT%explorer.exe, which is in fact a trojan component, allowing the attacker to remotely access the infected computers.
The trojan component modifies the registry key:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable]
to disable file system security and allows a remote attacker to access drives C: and D: via a web browser by adding read/write rights using the registry key:
[HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots]
screenshots

CodeRed Detection and Removal Tool Screenshots

CodeRed Detection and Removal Tool screenshot 1
similarSimilar Software