svdhost32.exe - Dangerous
svdhost32.exe
Manual removal instructions:
Antivirus Report of svdhost32.exe:
svdhost32.exe
W32.Gaobot.ZW is a minor variant of W32.Gaobot.SY.
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
Attempts to terminate processes related with some antivirus software.
The worm uses multiple vulnerabilities to spread, including:
- The Microsoft Messenger Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-043).
- The Locator service vulnerability (described in Microsoft Security Bulletin MS03-001) using TCP port 445.
The worm specifically targets Windows 2000 machines using this exploit.
- The UPnP vulnerability (described in Microsoft Security Bulletin MS01-059).
- The vulnerabilities in the Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061), using UDP port 1434.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
Copies itself as %System%\svdhost32.exe.
Adds the value: "Hotfix Updat"="svdhost32.exe"
to the registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Deletes the values: "Ssate.exe"; "rate.exe"; "d3dupdate.exe"; "TaskMon"; "Explorer"
from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Terminates the following processes: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Deletes the following files: %System%\irun4.exe; %System%\i11r54n4.exe; %System%\winsys.exe; %System%\bbeagle.exe; %System%\taskmon.exe
Deletes the service, upnphost.
Adds the following lines to the %System%\drivers\etc\hosts file, so that any attempts to connect to some antivirus Web sites fail.
Remove it automatically from startup by RegRun Startup Optimizer.
svdhost32.exe | Malware |
svdhost32.exe | Dangerous |
svdhost32.exe | High Risk |
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
Attempts to terminate processes related with some antivirus software.
The worm uses multiple vulnerabilities to spread, including:
- The Microsoft Messenger Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-043).
- The Locator service vulnerability (described in Microsoft Security Bulletin MS03-001) using TCP port 445.
The worm specifically targets Windows 2000 machines using this exploit.
- The UPnP vulnerability (described in Microsoft Security Bulletin MS01-059).
- The vulnerabilities in the Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061), using UDP port 1434.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
Copies itself as %System%\svdhost32.exe.
Adds the value: "Hotfix Updat"="svdhost32.exe"
to the registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Deletes the values: "Ssate.exe"; "rate.exe"; "d3dupdate.exe"; "TaskMon"; "Explorer"
from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Terminates the following processes: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Deletes the following files: %System%\irun4.exe; %System%\i11r54n4.exe; %System%\winsys.exe; %System%\bbeagle.exe; %System%\taskmon.exe
Deletes the service, upnphost.
Adds the following lines to the %System%\drivers\etc\hosts file, so that any attempts to connect to some antivirus Web sites fail.
Remove it automatically from startup by RegRun Startup Optimizer.
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.