winlink32.exe - Dangerous

winlink32.exe

Manual removal instructions:

Antivirus Report of winlink32.exe:
winlink32.exe Malware
winlink32.exeDangerous
winlink32.exeHigh Risk
winlink32.exe
W32.Gaobot.AAY is a minor variant of W32.Gaobot.SY.
Also known as: W32.HLLW.Gaobot.gen, W32/Gaobot.worm.gen.d, Backdoor.Agobot.kr
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Sniffs HTTP, FTP, and IRC traffic.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
The worm uses multiple vulnerabilities to spread, including:
DCOM RPC, WebDav, Workstation service buffer overrun, etc.

Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.

Copies itself as:
%System%\winlink32.exe

Adds the string value: "Winlink"="winlink32.exe"
to these registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Terminates a long list of processes, including: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Make any attempts to connect to some Web sites fail.
Starts an FTP server on a randomly selected TCP port.

Manual removal:
Navigate to each of the following keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
and delete the value: "Winlink"="winlink32.exe"

Remove winlink32.exe now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.