Abuse Melding

Je hebt een klacht over de onderstaande posting:

08-05-2004, 16:23 door Anoniem

http://securityresponse.symantec.com/avcenter/venc/data/backdoor.egghead. html When Backdoor.EggHead is executed, it does the following: It creates the folder %systemroot%System32Vchost and then copies all of its program files into that folder. NOTE: %systemroot% is a variable. The worm locates the Windows folder (by default this is C:Windows or C:Winnt). Some files are also copied to the %systemroot% folder. Those files are the following: Services.exe Pskill.exe B.bat Tcpsvcs.exe Good_client.exe.

Beschrijf je klacht (Optioneel):

captcha