Virus type: Worm
This memory-resident worm arrives via peer-to-peer, file-sharing applications or Internet Relay Chat (IRC).
To propagate through peer-to-peer networks, it drops copies of itself using enticing file names on default shared folders.
This worm overwrites HTM files. It exploits known vulnerabilities in Windows known as the Object Tag Code Base Exploit (MS02-015) and MHTML Exploit (MS03-014). It also terminates certain processes, which are usually associated with antivirus programs.
This UPX-compressed malware is written and compiled using Visual Basic, a high-level programming language. It uses an icon usually associated with Folders.
It runs on Windows 95, 98, ME, NT, 2000 and XP.
Your favorite shows are back!
Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!