Virus brontok.at




















Microsoft Security Essentials. Microsoft Safety Scanner. When the worm runs, it creates a folder and downloads a text file from a remote website to that folder. The worm also makes several copies of itself in various other folders, using different file names with one of the following extensions:.

File names used by the worm may be identical to certain Windows system file names, such as csrss. By default, Windows suppresses the extension on executable files. This, in conjunction with the use of the 'new folder' icon, can cause the file to appear as if it were a new folder rather than an executable file.

An unsuspecting user clicking on the "folder" to view its contents thereby inadvertently runs the worm file. To further promote the impression that the worm file is merely a folder, a new Explorer window is opened when the worm is run. The worm spoofs the sender 'From' address. The e-mail characteristics vary. For example, some variants compose an e-mail with a blank subject line and empty message body, and the infected attachment is named 'kangen.

Still other variants compose an e-mail in which either the subject line or message body may contain a political message or advertise some pictures, written in a mix of Indonesian and English. In such cases, the attachment is often named 'Sample Picture. When the infected e-mail attachment is opened, the worm may use various methods to run automatically each time Windows starts.

Automatic startup methods that the worm employs may include:. Placing a copy of itself in the user's startup folder, i. Adding registry value: Shell with data: "explorer. Prevents the user from accessing the Registry Editor by making the following registry edit:. Prevents the display of executable file extensions:. Prevents access to the Folder Options menu:.

Attempts ping attacks against certain Web sites, presumably to launch a form of denial of service DoS attack. Terminates applications or restarts Windows when the title of the active window contains certain strings, many of which may be representative of antivirus or system tools that might ordinarily be used to detect or remove the worm. Overwrites the autoexec. Take the following steps to help prevent infection on your computer: Enable a firewall on your computer. How to turn on the Windows Firewall in Windows 7.

How to turn on the Windows Firewall in Windows Vista. How to turn on the Windows firewall in Windows XP. Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor Web sites. You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.

How to turn on Automatic Updates in Windows 7. Sorry this didn't help. Thanks for your feedback. Can you help me my laptop has a virus I can't get rid of can you help. How will I know if all my contacts all my pictures all my files if transfer to a exsteria hard drive will get the virus on.

This thread is locked. You can follow the question or vote as helpful, but you cannot reply to this thread. I have the same question 0. Report abuse. Details required :. Cancel Submit. Reza Ameri Volunteer Moderator. What version of Windows are you using?

Did you see this in your device or from a website? Is it a website or an application? How satisfied are you with this reply?



0コメント

  • 1000 / 1000