Aliases: Proxy-Agent.a, Downloader.Small.OF, Trojan-Proxy.Win32.Agent.lk, Trojan:Win32/Lowzones.gen!D,
Variants: Win32/TrojanProxy.Agent.LK, Trj/Downloader.MDW, Trojan.Proxy.Agent.AZK
Classification: Malware
Category: Computer Worm
Status: Active & Spreading
Spreading: Moderate
Geographical info: Asia, North and South America, and some parts of Europe and Australia
Removal: Easy
Platform: W32
Discovered: 08 Jul 2007
Damage: Medium
Characteristics: The
[email protected] application is a mass mailing worm that collects e-mail addresses from the computer. It as well alters the Start Page for Web Browser and reduces Internet security settings. This worm affects Windows 95, Windows 98, Windows XP, Windows NT, Windows Me, Windows 2000, and Windows Server 2003.
If you have Malware on your computer it will cause annoyances and will damage your system. You should either:
A. Manually remove the infected files from your computer, or
B. Automatically scan your system using trusted software
RECOMMENDED:
We recommend that you scan your system for malware. Our partner has a computer worm removal tool to automatically clean
[email protected] from your computer.
[email protected] is a malicious email that can be installed by means of infected Windows security holes or infected attachments. After installation, the worm gathers information concerning all emails on the compromised computer and sends itself to these addresses. This worm could hijack your home page and disable your anti virus programs. The intention of this worm is to search and steal data from your storage devices. This worm has the ability to allow remote access, reinstall its self, lift your personal data, install other malware, and if not removed right away the worm will be more difficult to purge so it is very much advisable to remove the worm from your computer immediately.
The
[email protected] program creates a backdoor in the system. An idle system port is opened without alerting the system. This is used to connect to a remote server specified in its programming. It will then wait for instructions. It can be commanded to perform a number of activities in the infected computer. This can include manipulating the programs, files, and settings. Additional malicious software may also be added to the system. These can also be spread to other connected computers.