![runescape 2007 ddos tool runescape 2007 ddos tool](https://i.ytimg.com/vi/tjpcS3LCkh8/maxresdefault.jpg)
This worm connects to any of the following IRC server(s): It drops copies of itself in the following shared folders: (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.)
![runescape 2007 ddos tool runescape 2007 ddos tool](https://i.ytimg.com/vi/wE7T0UO2cX4/maxresdefault.jpg)
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\\morpheus\my shared folder\ This worm drops the following file(s)/component(s): Payload: Compromises system security, Terminates processes, Modifies HOSTS file It does this by checking the user name of the affected computer, or by checking if there are any applications running on the infected system that indicates it is being monitored or tested. SDBOT stops running when it detects that is running on a test environment. SDBOT's backdoor capabilities allows other commands and functions to be performed on the infected computer. It downloads and installs files such as FAKEAV. This family is primarily geared towards downloading other files - a pay-per-install scheme known in the cybercrime economy. It is known to spread by exploiting vulnerabilities, by dropping copies of itself in removable drives and network shares, and by being shared through peer-to-peer (P2P) networks. The SDBOT family of worms have been around since 2004.
Runescape 2007 ddos tool software#
Infection Channel: Propagates via removable drives, Propagates via peer-to-peer networks, Propagates via network shares, Propagates via software vulnerabilities, Propagates via IRC, Downloaded from the Internet