Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files.
Please check this Knowledge Base page for more information. Analysis by: Mark Joseph Manahan. D mm Symantec. EXE file to Windows folder and creates a startup key for this file in the Registry:. The worm has the same list of file extensions that it uses to look for email addresses. Here's the list of file extensions that the worm uses:. Like its previous variants, this worm variant avoids sending emails to addresses that contain the following strings:. The worm doesn't use any exploits to make its file run automatically on recipients' systems.
A recipient has to run the executable attachment to get infected. Javascript is disabled in your web browser For full functionality of this site it is necessary to enable JavaScript. Classification Category :. Type :. Aliases :. D mm, Somefool, I-Worm. Summary A new variant of Netsky worm - Netsky. Removal Automatic action Suspect a file is incorrectly detected a False Positive?
Automatic action Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it. Suspect a file is incorrectly detected a False Positive? If you wish, you may also: Check for the latest database updates First check if your F-Secure security program is using the latest detection database updates , then try scanning the file again.
From the Windows Advanced Options menu, select a safe mode option. Ending the worm process will help stop your computer from infecting other computers as well as resolve the crashing, rebooting, and performance degradation issues caused by the worm.
To end the worm process. Click Processes and click Image Name to sort the running processes by name. To delete the worm files from the computer. If deleting file MsnMsgrs. To delete the worm registry entry. To restart your computer. Select Restart from the drop-down list and click OK.
Do not reconnect your computer to the Internet until the computer is protected from re-infection. See the "Preventing Infection" section for more information. CZ mm runs, it checks for the presence of mutex MutexAninha22apr.
0コメント