Description: The worm will produce Arod.exe and get to C: WINDOWS catalogue. After starting the machine again, will put worm shelf Arod.exe into C:, C: WINDOWS, In zip file under WINDOWS system32, these three catalogues,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting, and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.
- [w32_worm_gmoose] - The worm will duplicate the noumenonn un
- [blaster] - W32.Blaster.Worm is a worm that propagat
File list (Check if you may need any files):
w32_worm_Arod
.............\A-rod.dsp.bak
.............\A-rod.dsw.bak
.............\A-rod.ncb
.............\A-rod.opt
.............\A-rod.plg
.............\apple.ncb
.............\apple.opt
.............\apple.plg
.............\Arod.c
.............\Arod.dsp
.............\Arod.dsp.bak
.............\Arod.dsw
.............\Arod.dsw.bak
.............\Arod.ncb
.............\Arod.opt
.............\Arod.plg
.............\build.bat
.............\build.bat.bak
.............\Debug
.............\Release
.............\RESOURCE.H