![]() But, when run, this executable will copy itself to your Windows System directory with the filename Explore.exe or to your Windows directory with the filename _setup.exe. You may receive the worm as an attachment called zipped_files.exe, masquerading itself as the usual self-extracting zip file. This continues to occur until the worm is removed. xls on your hard drives, any mapped drives, and any network machines that are accessible each time it is executed. The payload of the worm will destroy any file with the extension. The worm will also search the mapped drives and networked machines for Windows installations and copy itself to the Windows directory of the remote machine and modify the WIN.INI accordingly. The worm utilizes Microsoft Outlook, Outlook Express, Exchange to mail itself out by replying to unread messages in your Inbox. ![]() ![]() ![]() Worm.ExploreZip is a worm that contains a malicious payload. ![]()
0 Comments
Leave a Reply. |