Characteristics
- Turns off anti virus applications
- Allows others to access the computer
- Modifies data on the computer
- Steals information
- Downloads code from the internet
- Reduces system security
- Records keystrokes
- Installs itself in the registry
- Exploits known vulnerabilites
- Monitors browser activity
- Monitors System Activity
- Enables remote access
- Scans network for vulnerabilities
- Scans network for weak passwords
Affected Operating Systems

Recovery Instructions:
Please follow the instructions for removing worms.