Nimda Detection & Clean Crack & Activation Code
This virus comes through e-mail as an attached file, with the body of the mail apparently empty but which actually contains the code to use the IFRAME exploit which will execute the virus when the user just view the message (if he is using Outlook or Outlook Express without latest Service Packs or patches from Microsoft). Once installed it copies itself in the system directory with the name riched20.dll modifying itself to be loaded as a DLL (Dinamically Link Library). This DLL is used by applications that work with Richedit Text Format such as Wordpad.
|Crack size||~ 500KB|
To be activated at every reboot, the virus modifies system.ini in the boot section, writing the following line:
shell=explorer.exe load.exe -dontrunold
The virus attaches a thread to explorer.exe to run its viral code.
To spread it uses MAPI (Mailing API) functions to read user's e-mails from where it extracts SMTP (Simple Mail Transfer Protocol) addresses and e-mail addresses.
Another method to spread is by using the Unicode Web Traversal exploit similar to CodeBlue.
Using this exploit the virus gets control of the execution flow on that server and download itself under the name admin.dll, then puts a HTML code in the web page hosted by the IIS server to download the virus. To do this it tries to modify the files with the name:
index, main, default
and with the extension one of:
Also the virus enumerates the network resources visible to the infected computer and tries to copy in shared files or folders.
The virus is able to infect files by attaching the executable as a resource with raw data named f in the virus program. When the infected file is executed the virus takes over the control and executes the original file so the user doesn't notice anything. This is accomplished by dropping that f resource in a file with the same name as the original but with a space appended, followed by .exe.
The virus activates the user guest with no password and add it to the Administrator group. Also it creates a share for every root directory (from C to Z) with all access rights, and disables the proxy by modifying the keys:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsMigrateProxy with the value "1"
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsProxyEnable with the value "0"
HKEY_CURRENT_CONFIGSoftwareMicrosoftWindowsCurrentVersionInternet SettingsProxyEnable with the value "0"
Leaving the library riched20.dll not deleted will reactivate the virus when a program using this library is executed.
giovanna, 16 December 2016
how to download Nimda Detection & Clean serial?
Leave a comment
Your email will not be published. * Required