Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2012 SHA1 Hash: 90377745606243ab9acc902d706df67a14f07e50 Size: 245.76 KB File Format: exe
Rating: 2.130434782
out of 5
based on 23 user ratings
Downloads: 1397 License: Free
Nimda Detection & Clean is a free software by Bitdefender LLC and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012.
You can download Nimda Detection & Clean which is 245.76 KB in size and belongs to the software category Removal Tools. Nimda Detection & Clean was released on 2010-08-03 and last updated on our database on 2017-02-27 and is currently at version 1.
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
Nimda Detection & Clean Description
Nimda Detection & Clean is a lightweight and useful tool that was designed in order to help you erase the dangerous Win32.Nimda.A@mm and Win32.Nimda.E@mm viruses.
This virus comes through e-mail as an attached file, with the body of the mail apparently empty but which actually contains the code to use the IFRAME exploit which will execute the virus when the user just view the message (if he is using Outlook or Outlook Express without latest Service Packs or patches from Microsoft). Once installed it copies itself in the system directory with the name riched20.dll modifying itself to be loaded as a DLL (Dinamically Link Library). This DLL is used by applications that work with Richedit Text Format such as Wordpad.
To be activated at every reboot, the virus modifies system.ini in the boot section, writing the following line:
shell=explorer.exe load.exe -dontrunold
The virus attaches a thread to explorer.exe to run its viral code.
To spread it uses MAPI (Mailing API) functions to read users e-mails from where it extracts SMTP (Simple Mail Transfer Protocol) addresses and e-mail addresses.
Another method to spread is by using the Unicode Web Traversal exploit similar to CodeBlue.
Using this exploit the virus gets control of the execution flow on that server and download itself under the name admin.dll, then puts a HTML code in the web page hosted by the IIS server to download the virus. To do this it tries to modify the files with the name:
index, main, default
and with the extension one of:
.html
.htm
.asp
Also the virus enumerates the network resources visible to the infected computer and tries to copy in shared files or folders.
The virus is able to infect files by attaching the executable as a resource with raw data named f in the virus program. When the infected file is executed the virus takes over the control and executes the original file so the user doesnt notice anything. This is accomplished by dropping that f resource in a file with the same name as the original but with a space appended, followed by .exe.
The virus activates the user guest with no password and add it to the Administrator group. Also it creates a share for every root directory (from C to Z) with all access rights, and disables the proxy by modifying the keys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy with the value "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable with the value "0"
HKEY_CURRENT_CONFIG\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable with the value "0"
Leaving the library riched20.dll not deleted will reactivate the virus when a program using this library is executed.