Bobax Removal Tool

Bobax Removal Tool crack / serial

Bobax Removal Tool is a lightweight application that can fight off the Bobax worm, versions A and C.

Version A (exploits the LSASS vulnerability - see Microsoft Security Bulletin MS04-011):

Bobax Removal Tool

Download Bobax Removal Tool crack and serial


The worm comes as an EXE, but its main functionality is contained in a DLL embedded in the EXE. The EXE was written in Assembler and/or C, linked with the linker in Visual C++ 6 and encrypted with a simple algorithm; the DLL was written in Visual C++ 7.10 and packed with UPX.

When run, the EXE decrypts itself, gets the functions it needs from kernel32 and user32, drops the embedded DLL to a temporary file with the name starting with a '~' character and attempts to inject and run the DLL in the address space of the process that owns the Shell_TrayWnd window (Windows Explorer) using the classic VirtualAllocEx/WriteProcessMemory/CreateRemoteThread method (this works on NT versions of Windows); if it fails, it calls RegisterServiceProcess to hide itself from the Task Manager (on Windows 9x) and loads and runs the DLL in its own address space. In either case, the DLL's exported function "Run" is called with a parameter containing the current command line; this way, the pathname of the EXE is known by the DLL.

The DLL uses a mutex called "00:24:03:54A9D" to avoid multiple copies of itself running. A thread is created to check for Internet connection and copy the IP of the local machine to a global string every 5 seconds.

In order to uniquely identify the infected machine, the serial number of the harddisk drive containing the Windows folder (or the C: drive) is used to generate an 8 hexadecimal digits string.

All files in the temporary folder that have the name starting with '~' are deleted (including the dropped DLL); the EXE is copied to the Windows System folder in two files named [5 to 14 random letters].exe; the registry entries HKLMSoftwareMicrosoftWindowsCurrentVersionRun[hdd id] and HKLMSoftwareMicrosoftWindowsCurrentVersionRunServices[hdd id] are created to run these files at every startup.

The main routine waits for a connection to Internet; it attempts to access a script on the following hosts:

- http://chilly[X].no-ip.infob

- http://kwill[X]

- http://cheese[X]

- http://butter[X]

- http://[5 to 12 random letters]

where [X] loops through all hexadecimal digits.

The script is called "reg"; the worm reports the hdd id and the version of the worm (114 for Bobax.A). The reply must include the hdd id as the first 8 characters; the rest of the reply specifies a command and an argument to that command; the following actions can be performed, depending on the command:

- "upd": An EXE is downloaded from a specified URL and launched; the worm ends its execution;

- "exe": An EXE is downloaded from a specified URL; the worm doesn't end its execution;

- "scn": Infects other machines. The worm creates an HTTP server on a random port between 2000 and 61999; any client that connects is given the copy of the worm to download (as image/gif); this is used to upload the copy of the worm to the exploited machines.

The IP's to infect are generated from the local IP by keeping the first 1 or 2 bytes and generating random values for the last bytes; 128 threads are created in order to infect 128 machines (65 of these threads keep only the 1st byte of the local IP and modify the other 3; the other 63 keep the first 2 bytes of the local IP and modify the other 2). The worm first attempts a connection to TCP port 5000 of the target IP; it then sends the exploit SMB packets to the LSASS service on TCP port 445. The exploit code will download a copy of the worm from the HTTP server as "svc.exe" and run it.

- the worm can download some data that is used to set up an email relay; the data is downloaded from a specified host's "get" script to a temporary file named [crc of full URL]_[hdd id].tmp; the data is checked for integrity using a simple hash function; a status

- the worm can also report some progress information to a "status" script on a specified website;

- "spd": reports the following information to a "speed" script running on a specified website: hdd id, Internet connection speed (number of bytes per second when downloading a maximum of 512 KB from a specified URL), RAM size, total free space on fixed drives, operating system version, CPU type & speed, IP, screen resolution.

Version C is similar to version A, but besides the LSASS vulnerability, it also attempts to infect other machines by exploiting the DCOM RPC vulnerability (see Microsoft Security Bulletin MS03-039) (packets are sent to TCP port 135).

It reports version 117 instead of 114 to the "reg"scripts; it opens one of the following URL's:






It also tries to open the following URL besides the ones listed for A:

- http://[5 to 12 random letters]

Released: Aug 5th 2010 Rating: 4.6
Size: 56 KB Downloads: 5166
Systems: Win All

User replies

14 September 2018, luciano said:

спасибі за кряк для Bobax Removal Tool

25 May 2018, Gustavo said:

thank you

13 January 2018, Jennifer said:

muito obrigado pela crack do Bobax Removal Tool

Leave a reply

Your email will not be published. * Required fields

Website search

Recently updated

Free Virus Removal Tool for W32/Vilsel Trojan Free Virus Removal Tool for W32/Vilsel Trojan Erase the Vilsel trojan from your computer
Free Virus Removal Tool for W32/Piker Trojan Free Virus Removal Tool for W32/Piker Trojan Finds and auto-deletes files infected with Piker, a Trojan whose goal is to take screenshots of your computer and steal personal information
Happy99 Virus Scanner and Remover Happy99 Virus Scanner and Remover This is a useful application for getting rid of the Happy99 malware

Software News

Jan 21
Three WordPress plugins have been picking up quite the glare of attention this month after researchers found serious vulnerabilities in them-and the numbers are sobering, in that these plugins have been installed on more ...
Jan 20
Teaching online video game players to save lives, not take them-that is the aim of a new product developed in an unusual collaboration between the creators of the wildly popular Fortnite games and the International Committee ...
Jan 17
Researchers from Dartmouth and the Massachusetts Institute of Technology (MIT) have developed an original approach to flight scheduling that, if implemented, could result in a significant increase in profits for airlines ...
Jan 15
The National Security Agency has discovered a major security flaw in Microsoft's Windows 10 operating system that could allow hackers to intercept seemingly secure communications.
Jan 14
If you're still using Microsoft's Windows 7, your computer might soon be at risk.
Jan 9
Microsoft says it has developed a technique to detect online predators who try to groom children for sexual purposes using the chat function in multiplayer video games.
Jan 9
Apps are still alive and well, and when it comes to gaming, incredibly popular and still thriving.

About us

Welcome to new crack resource! Our service can generate cracks, keygens and serials for your software to unlock it. CrackDownloadz provides a lot of popular cracks and keygens. No spyware and adware at all, just download new cracks, keygens and serials. If you have a software that needs a crack feel free to contact us.

Also you may contact us if you have software that needs to be removed from our website.