winlink32.exe - Dangerous
winlink32.exe
Manual removal instructions:
Antivirus Report of winlink32.exe:
winlink32.exe
W32.Gaobot.AAY is a minor variant of W32.Gaobot.SY.
Also known as: W32.HLLW.Gaobot.gen, W32/Gaobot.worm.gen.d, Backdoor.Agobot.kr
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Sniffs HTTP, FTP, and IRC traffic.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
The worm uses multiple vulnerabilities to spread, including:
DCOM RPC, WebDav, Workstation service buffer overrun, etc.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
Copies itself as:
%System%\winlink32.exe
Adds the string value: "Winlink"="winlink32.exe"
to these registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
Terminates a long list of processes, including: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Make any attempts to connect to some Web sites fail.
Starts an FTP server on a randomly selected TCP port.
Manual removal:
Navigate to each of the following keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
and delete the value: "Winlink"="winlink32.exe"
winlink32.exe | Malware |
winlink32.exe | Dangerous |
winlink32.exe | High Risk |
Also known as: W32.HLLW.Gaobot.gen, W32/Gaobot.worm.gen.d, Backdoor.Agobot.kr
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Sniffs HTTP, FTP, and IRC traffic.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
The worm uses multiple vulnerabilities to spread, including:
DCOM RPC, WebDav, Workstation service buffer overrun, etc.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
Copies itself as:
%System%\winlink32.exe
Adds the string value: "Winlink"="winlink32.exe"
to these registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
Terminates a long list of processes, including: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Make any attempts to connect to some Web sites fail.
Starts an FTP server on a randomly selected TCP port.
Manual removal:
Navigate to each of the following keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
and delete the value: "Winlink"="winlink32.exe"
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.