Free Spyware Removal Help
Free Spyware Remover
Free Anti Spyware
664,512 Scans
134,389 Threats
Threat List
File List
Startup List







AGOBOT-ZH Information  
Threat Name: AGOBOT-ZH  
W32/Agobot-ZH copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and RPC locator vulnerabilities. These vulnerabilities allow the worm to execute its code on target computers with system level privileges. For further information on these vulnerabilities and for details on how to patch the computer against such attacks please see Microsoft security bulletins MS03-026 and MS03-001. When first run W32/Agobot-ZH copies itself to the Windows system folder with the filename wintcp.exe and creates the following registry entries so that the worm is run when Windows starts up: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Windows TCP/IP = wintcp.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\ Windows TCP/IP = wintcp.exe W32/Agobot-ZH connects to a remote IRC server and joins a specific channel. The backdoor functionality of the worm can then be accessed by an attacker using the IRC network. The worm also attempts to terminate and disable various security related programs. More Information  
  Scan for this threat





0 Identified Patterns

EXE Files DLL Files Other Files  

Home Search Links   About Us Software Downloads