Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2012 SHA1 Hash: f4fc2078ce9e61f8ceadc30c320bff21998178da Size: 34.82 KB File Format: exe
Rating: 1.956521739
out of 5
based on 23 user ratings
Downloads: 1303 License: Free
Ganda Removal Tool is a free software by Bitdefender LLC and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012.
You can download Ganda Removal Tool which is 34.82 KB in size and belongs to the software category Removal Tools. Ganda Removal Tool was released on 2010-08-02 and last updated on our database on 2017-02-27 and is currently at version 1.
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
Ganda Removal Tool Description
Ganda Removal Tool is a small but effective application that targets the Win32.Ganda.A@mm malware.
Once run, it creates two copies of itself in Windows folder: SCANDISK.EXE and another randomly named file (ex: "xjvhtbxt.EXE").
Creates a mutex "SWEDENSUX" in order to allow only one copy of itself in memory.
It attempts to shut down processes with names as "virus","firewall","f-secure","symantec","mcafee","pc-cillin","trend micro","kaspersky","sophos","norton".
It infects executable files by searching for *.exe, *.scr and *.lnk files in %windir%\DESKTOP\ and %windir%\START MENU\ If a .lnk file is found, it retrieves the executable path and name contained within the .lnk file, then opens the file (if it founds a .exe or a .scr file, it opens them directly) and adds a stub to the end of the executable file, then hijacks one of the functions ExitProcess, GetProcAddress, GetModuleHandleA, LoadLibraryA to point to the stub. The stub loads and executes the file with random name in Windows folder (ex: "xjvhtbxt.EXE").
It creates registry key
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\ CurrentVersion\Run\"ScanDisk"="C:\WINDOWS\SCANDISK.exe"]
It looks in [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] and
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices] and attempts to modify the files pointed by the keys, and render them unusable.
It harvests e-mails searching for files matching "*.eml","*.htm*","*.dbx" and Windows Address Book. It also contains some hardcoded e-mails.