Aliases: N/A
Variants: N/A

Classification: Malware
Category: Computer Virus

Status: Dormant
Spreading: Slow
Geographical info: Europe, North and South America, and some parts of Asia and Australia
Removal: Easy
Platform: W32
Discovered: 27 Feb 2002
Damage: Low

Characteristics: W32.Fully.3424 is a virus in assembly language. It is also characterized as a 32-bit virus which contains several bugs and is unlikely to spread. It attacks most of the portable executable files in all of your Windows Operating Systems. A good example of a Portable Executable is a screen saver (.scr) file. The virus also contains encryption codes in order for the virus to hide its track and code from several antivirus applications. Once executed, it searches for Kernel32.dll in the memory and it scrutinizes its functions so that it turn, it can also use that function for infection. When it's successful, it consequently finds the hard drive for executable files or “.exe” files.

More details about W32.Fully.3424

Its starts locating at “C” drive and only attempts to infect two files. The only difference of this virus with others is that it doesn’t replicate because of the overwhelming number of bugs it has in its code. It only modifies codes and entry points through which will cause the virus to run directly when an infected file is executed. In order to see the symptoms of this virus to the compromised computer, one may see a display of this message, “You will delete anything? This future are not avaible!” Then, it will state the name of the author. After displaying the message, reports also say that the virus’s bug is in the viral code. This generally causes Windows to stop responding.

Through the W32.Fully.3424 program, intruders may take advantage of flaws in certain programs and security software installed in the user’s computer. Hackers could find security loopholes and programming flaws in the computer and then use it to remotely control the computer. It is believed that it could spread infected files through peer-to-peer file sharing programs like music downloading websites. It can also distribute other viruses and threats by sending spam e-mails to e-mail addresses collected from the user’s infected computer.