SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning -- Ignore unavailable to you. Want to Upgrade?


To: mr.mark who wrote (4021)6/12/1999 12:54:00 AM
From: Karin  Respond to of 110626
 
Here is another Worm Virus:

Worm.ExploreZip

Virus Name: Worm.ExploreZip
Aliases: W32.ExploreZip Worm
Infection Length: 210,432 bytes
Area of Infection: Windows System directory, Email Attachments
Likelihood: Common
Detected as of: June 6, 1999
Characteristics: Worm, Trojan Horse

Overview:
Worm.ExploreZip contains a very malicious payload. Worm.ExploreZip utilizes Microsoft Outlook, Outlook Express, and Microsoft Exchange to mail itself out by replying to unread messages in your Inbox. The payload of the worm will destroy any file with the extension .h, .c, .cpp, .asm, .doc, .ppt, or .xls on your hard drive(s), as well as any mapped drives, each time it is executed. The worm will also search the mapped drives for Windows installations and copy itself to the Windows directory, and then modify the WIN.INI file. This will infect systems without e-mail clients. This continues to occur until the worm is removed.

You may receive this worm as a file attachment named "zipped_files.exe". When run, this executable will copy itself to your Windows System directory with the filename "Explore.exe", or your Windows directory with the filename "_setup.exe". The worm modifies your WIN.INI or registry such that the "Explore.exe" file is executed each time you start Windows.

Worm.ExploreZip was first discovered in Israel and submitted to the Symantec AntiVirus Research Center on June 6, 1999.

Technical Description:

Worm.ExploreZip utilizes MAPI commands and Microsoft Outlook/Outlook Express/Microsoft Exchange on Windows 9x and NT systems to propagate itself.

The worm e-mails itself out as an attachment with the filename "zipped_files.exe" in reply to unread messages it finds in your Inbox. Thus, the e-mail message may appear to come from a known e-mail correspondent in response to a previously sent e-mail. The e-mail contains the following text:

Hi Receipient Name!

I received your email and I shall send you a reply ASAP.

Till then, take a look at the attached zipped docs.

bye or sincerely Receipient Name
Once the attachment is executed, it may display the following window:



To: mr.mark who wrote (4021)6/12/1999 11:22:00 AM
From: Doug Coughlan  Read Replies (3) | Respond to of 110626
 
This looks to be a useful free utility for members of this thread. This link describes it ("deletes lame files") and will lead to a download site if anyone is interested.
updates.com