2260 S. Church St. Suite 601
Burlington, NC 27215

Phone:

(336)226-0425 - Alamance Co.

1-

(888)815-7284 - Toll Free

Fax:

(336)226-1688

 

Email Us

 

Navigation Menu
 


Latest Virus Warning Information


Table of Contents

Loveletter / I Love You
PrettyPark
ExploreZip
Melissa
Happy99


CERT Advisory CA-2000-04 Love Letter Worm

Original release date: May 4, 2000
Source: CERT/CC
A complete revision history is at the end of this file.

Systems Affected
* Systems running Microsoft Windows with Windows Scripting Host enabled

Overview

The "Love Letter" worm is a malicious VBScript program which spreads in a variety of ways. As of 2:00pm EDT(GMT-4) May 4, 2000 -- the CERT Coordination Center has received reports from more than 250 individual sites indicating more than 300,000 individual systems are affected. In addition, we have several reports of sites suffering considerable network degradation as a result of mail, file, and web traffic generated by the "Love Letter" worm.

I. Description

You can be infected with the "Love Letter" worm in a variety of ways, including electronic mail, Windows file sharing, IRC, USENET news and possibly via webpages. Once the worm has executed on your system, it will take the actions described in the Impact section.

Electronic Mail

When the worm executes, it attempts to send copies of itself using Microsoft Outlook to all the entries in all the address books. The mail it sends has the following characteristics:

* An attachment named "LOVE-LETTER-FOR-YOU.TXT.VBS"
* A subject of "ILOVEYOU"
* A body which reads "kindly check the attached LOVELETTER coming from me."

People who receive copies of the worm via electronic mail will most likely recognize the sender. We encourage people to avoid executing code, including VBScripts, received through electronic mail regardless of the sender without firsthand prior knowledge of the origin of the code.

Internet Relay Chat

When the worm executes, it will attempt to create a file named script.ini in any directory that contains certain files associated with the popular IRC client mIRC. The script file will attempt to send a copy of the worm via DCC to other people in any IRC channel joined by the victim. We encourage people to disable automatic reception of files via DCC in any IRC client.

Executing Files on Shared File Systems

When the worm executes, it will search for certain types of files and replace them with a copy of the worm (see the Impact section for more details). Executing (double clicking) files modified by other infected users will result in executing the worm. Files modified by the worm may also be started automatically, for example from a startup script.

Reading USENET News

There have been reports of the worm appearing in USENET newsgroups. The suggestions above should be applied to users reading messages in USENET newsgroups.

II. Impact

When the worm is executed, it takes the following steps:
Replaces Files with Copies of the Worm

When the worm executes, it will search for certain types of files and make changes to those files depending on the type of file. For files on fixed or network drives, it will take the following steps:

* For files whose extension is vbs or vbe it will replace those files with a copy of itself.
* For files whose extensions are js, jse, css, wsh, sct, or hta, it will replace those files with a copy of itself and change the extension to vbs. For example, a file named x.css will be replaced with a file named x.vbs containing a copy of the worm.
* For files whose extension is jpg or jpeg, it will replace those files with a copy of the worm and add a vbs extension. For example, a file named x.jpg will be replaced by a file called x.jpg.vbs containing a copy of the worm.
* For files whose extension is mp3 or mp2, it will create a copy of itself in a file named with a vbs extension in the same manner as for a jpg file. The original file is preserved, but its attributes are changed to hidden.

Since the modified files are overwritten by the worm code rather than being deleted, file recovery is difficult and may be impossible.
Users executing files that have been modified in this step will cause the worm to begin executing again. If these files are on a filesystem shared over a local area network, new users may be affected.

Creates an mIRC Script

While the worm is examining files as described in the previous section, it may take additional steps to create a mIRC script file. If the file name being examined is mirc32.exe, mlink32.exe, mirc.ini, script.ini or mirc.hlp, the worm will create a file named script.ini in the same folder. The script.ini file will contain:

[script]
n0=on 1:JOIN:#:{
n1= /if ( $nick == $me ) { halt }
n2= /.dcc send $nick DIRSYSTEM\LOVE-LETTER-FOR-YOU.HTM
n3=}
where DIRSYSTEM varies based on the platform where the worm is executed. If the file script.ini already exists, no changes occur.
This code appears to define a script such that whenever the user joins a channel in IRC, a copy of the worm will be sent to others on the channel via DCC. The script.ini file is created only once per folder processed by the worm.

Modifies the Internet Explorer Start Page

If the file \WinFAT32.exe exists, the worm sets the Internet Explorer Start page to one of four randomly selected URLs. These URLs all refer to a file named WIN-BUGSFIX.exe, which presumably contains malicious code. The worm checks for this file in the Internet Explorer downloads directory, and if found, it is added to the list of programs to run at reboot. The Internet Explorer Start page is then reset to "about:blank". Information about the impact of running WIN-BUGSFIX.exe will be added to this document as soon as it is available.

Send Copies of Itself via Email

The worm will attempt to use Microsoft Outlook to send copies of itself to all entries in all address books as described in the Description section.

Other Modified Registry Keys

In addition to other changes, the worm updates the following registry keys:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\MSKernel32
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\Win32DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WIN-BUGSFIX
HKCU\Software\Microsoft\Windows Scripting Host\Settings\Timeout
HKCU\Software\Microsoft\Internet Explorer\Main\Start Page
HKCU\Software\Microsoft\WAB\*

III. Solution

Update Your Anti-Virus Product

It is important for users to update their anti-virus software. Some anti-virus software vendors have released updated information, tools, or virus databases to help prevent and combat this worm. A list of vendor-specific anti-virus information can be found in Appendix A.

Disable Windows Scripting Host

Because the worm is written in VBS, it requires the Windows Scripting Host (WSH) to run. Disabling WSH prevents the worm from executing. For information about disabling WSH, see:
http://www.sophos.com/support/faqs/wsh.html

This change may disable functionality the user desires. Exercise caution when implementing this solution.

Disable Active Scripting in Internet Explorer

Information about disabling active scripting in Internet Explorer can be found at:
http://www.cert.org/tech_tips/malicious_code_FAQ.html#steps

This change may disable functionality the user desires. Exercise caution when implementing this solution.

Disable Auto-DCC Reception in IRC Clients

Users of Internet Relay Chat (IRC) programs should disable automatic reception of files offered to them via DCC.

Filter Virus in E-Mail

Sites can use email filtering techniques to delete messages containing subject lines known to contain the worm. For sites using unix, here are some possible methods:

Sendmail

The following sendmail rule will delete all messages with the Subject:

line ILOVEYOU:

HSubject:[tab][tab][tab]$>Check_Subject
D{MPat}ILOVEYOU
D{MMsg}This message may contain the ILOVEYOU virus
SCheck_Subject
R${MPat} $*[tab]$#error $: 553 ${MMsg}
RRe: ${MPat} $*[tab]$#error $: 553 ${MMsg}
RFW: ${MPat} $*[tab]$#error $: 553 ${MMsg}

PostFix

Add the following line in /etc/postfix/header_checks:
/^Subject: ILOVEYOU/ REJECT

Procmail

This procmail rule also deletes any messages with the Subject:
line containing "ILOVEYOU":

:0 D
* ^Subject:[[tab] ]+ILOVEYOU
/dev/null

Note that in all of these examples, [tab] represents a literal tab character, and must be replaced with one for this to work correctly.
It is important to note that these three methods, as described, do not prevent the worm from spreading if the Subject: line of the email has changed. Administrators can use more complicated procmail rules to block the worm based on the body of the email, but such methods require more processing time on mail servers, and may not be feasible at sites with high volumes of email traffic.

Exercise Caution When Opening Attachments

Exercise caution with attachments in email. Users should disable auto-opening or previewing of email attachments in their mail programs. Users should never open attachments from an untrusted origin, or that appear suspicious in any way.

The CERT Coordination Center would like to thank David Slade of Lucent Technologies for their help in constructing this advisory. We thank Christopher Lindsey for the providing the procmail rule.


The following people were involved in the creation of this document:
Jeff Carpenter, Cory Cohen, Chad Dougherty, Ian Finlay, Kathy Fithen, Rhonda Green, Robert Hanson, Jeff Havrilla, Shawn Hernan, Kevin Houle, Brian King, Jed Pickel, Joseph Pruzynski, Robin Ruefle, John Schaffer, and Mark Zajicek


The full version of this document with additional links is available from:
http://www.cert.org/advisories/CA-2000-04.html


Aliases: Trojan Horse, W32.PrettyPark, Trojan.PSW.CHV, CHV

Infection Length: 37,376
Area of Infection:C:\Windows\System, Registry, Email Attachments
Likelihood: Common
Detected as of: June 1, 1999
Characteristics: Worm, PrettyPark.EXE, Files32.VXD

Description

This is a worm program that behaves similar to Happy99 Worm. This worm program was originally spread by email spamming from a French email address.

The attached program file is named "PrettyPark.EXE". The original report of this worm was submitted through our exclusive Scan&Deliver; system on May 28, 1999 from France.

When the attached program called "PrettyPark.EXE" is executed, it may display the 3D pipe screen saver. It will also create a file called FILES32.VXD in the WINDOWS\SYSTEM directory and modify the following registry entry value from "%1" %* to FILES32.VXD "%1" %* without your knowledge:

HKEY_LOCAL_MACHINE\Software\Classes\exefile\shell\open\command

Once the worm program is executed, it will try to email itself automatically every 30 minutes (or 30 minutes after it is loaded) to email addresses registered in your Internet address book.

It will also try to connect to an IRC server and join a specific IRC channel. The worm will send information to IRC every 30 seconds to keep itself connected, and to retrieve any commands from the IRC channel.

Via IRC, the author or distributor of the worm can obtain system information including the computer name, product name, product identifier, product key, registered owner, registered organization, system root path, version, version number, ICQ identification numbers, ICQ nicknames, victims email address, and Dial Up Networking username and passwords. In addition, being connected to IRC opens a security hole in which the client can potentially be used to receive and execute files.

Norton AntiVirus will detect PrettyPark.Worm as "Trojan Horse" with June 1, 1999 virus definitions. With the June 9, 1999 definitions or later, the worm will be detected as "PrettyPark.Worm."

Repair Information

Removing this worm manually:

  1. Using REGEDIT, modify the Registry entry

    HKEY_LOCAL_MACHINE\Software\Classes\exefile\
    shell\open\command

    from

    FILES32.VXD "%1" %* to "%1" %*

    (You may launch REGEDIT through Windows Start-menu-RUN. Then search for "FILES32.VXD" in REGEDIT.)

  2. Delete WINDOWS\SYSTEM\FILES32.VXD
  3. Delete the "Pretty Park.EXE" file.
  4. Reboot your computer.

You need to do step #1 above; otherwise, executable files may not run properly if you simply delete FILES32.VXD

Safe Computing

This worm, and other trojan-horse type programs, demonstrate the need to practice safe computing. You should not launch any executable-file attachment (EXE, SHS, MS Word or MS Excel file) that comes from an untrusted email or newsgroup source.

Write-up by: Raul K. Elnitiarta & Eric Chien at Symantic
June 1, 1999
Updated: June 9, 1999




W32/ExploreZip.worm(updated 6/14/99)

W32/ExploreZip.worm

CERT Advisory CA-99-06-explorezip

   Original issue date: Thursday June 10, 1999
   Last Revised Date: June 14, 1999
   Added information about the program's self-propagation via networked
   shares; also updated anti-virus vendor URLs.

   Source: CERT/CC

Note: The CERT Coordination Center has discovered new information regarding the ExploreZip worm. This re-issue of CERT Advisory CA-99-06 contains new information regarding an additional means by which the Worm can spread, and a caution about disinfecting your systems. We will continue to update this advisory as new information is discovered. We encourage you to check our web site frequently for any new information.



Systems Affected

* Machines running Windows 95, Windows 98, or Windows NT.
* Machines with filesystems and/or shares that are writable by a user of an infected system.
* Any mail handling system could experience performance problems or a denial of service as a result of the propagation of this Trojan horse program.

Overview

The CERT Coordination Center continues to receive reports and inquiries regarding various forms of malicious executable files that are propagated as file attachments in electronic mail.

During the second week of June 1999, the CERT/CC began receiving reports of sites affected by ExploreZip, a Trojan horse/worm program that affects Windows systems and has propagated in email attachments. The number and variety of reports we have received indicate that this has the potential to be a widespread attack affecting a variety of sites.

I. Description

Our original analysis indicated that the ExploreZip program is a Trojan horse, since it initially requires a victim to open or run an email attachment in order for the program to install a copy of itself and enable further propagation. Further analysis has shown that, once installed, the program may also behave as a worm, and it may be able to propagate itself, without any human interaction, to other networked machines that have certain writable shares.

The ExploreZip Trojan horse has been propagated between users in the form of email messages containing an attached file named zipped_files.exe. Some email programs may display this attachment with a "WinZip" icon. The body of the email message usually appears to come from a known email correspondent, and typically contains the following text:

I received your email and I shall send you a reply ASAP.
      Till then, take a look at the attached zipped docs.

The subject line of the message may not be predictable and may appear to be sent in reply to previous email.

Opening the zipped_files.exe file causes the program to execute. It is possible under some mailer configurations that a user might automatically open a malicious file received in the form of an email attachment. When the program is run, an error message is displayed:

Cannot open file: it does not appear to be a valid archive. If this file is part of a ZIP format backup set, insert the last disk of the backup set and try again. Please press F1 for help.

Destruction of files * The program searches local and networked drives (drive letters C through Z) for specific file types and attempts to erase the contents of the files, leaving a zero byte file. The targets may include Microsoft Office files, such as .doc, .xls, and .ppt, and various source code files, such as .c, .cpp, .h, and .asm.
* The program may also be able to delete files that are writable to it via SMB/CIFS file sharing. The program appears to look through the network neighborhood and delete any files that are shared and writable, even if those shares are not mapped to networked drives on the infected computer.
* The program appears to continually delete the contents of targeted files on any mapped networked drives.
The program does not appear to delete files with the "hidden" or "system" attribute, regardless of their extension.

System modifications

* The zipped_files.exe program creates a copy of itself in a file called explore.exe in the following location(s):

On Windows 98 - C:\WINDOWS\SYSTEM\Explore.exe
        On Windows NT - C:\WINNT\System32\Explore.exe

This explore.exe file is an identical copy of the zipped_files.exe Trojan horse, and the file size is 210432 bytes.
MD5 (Explore.exe) = 0e10993050e5ed199e90f7372259e44b
* On Windows 98 systems, the zipped_files.exe program creates an entry in the WIN.INI file:

     run=C:\WINDOWS\SYSTEM\Explore.exe

On Windows NT systems, an entry is made in the system registry:


[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
   run = "C:\WINNT\System32\Explore.exe"
Propagation via file sharing

Once explore.exe is running, it takes the following steps to propagate to other systems via file sharing:

* Each time the program is executed, the program will search the network for all shares that contain a WIN.INI file with a valid "[windows]" section in the file.
* For each such share that it finds, the program will attempt to
   + copy itself to a file named _setup.exe on that share
   + modify the WIN.INI file on that share by adding the entry
   "run=_setup.exe"

The account running the program on the original infected machine needs to have permission to write to the second victim's shared directory. (That is, no vulnerabilities are being exploited in order for the program to spread in this manner.)
The _setup.exe file is identical to the zipped_files.exe and explore.exe files on the original infected machine.

* The original infected system will continue to scan shares that have been mapped to a local drive letter containing a valid WIN.INI file. For each such share that is found, the program will "re-infect" the victim system as described above.

On Windows 98 systems that have a "run=_setup.exe" entry in the WIN.INI file (as described previously), the C:\WINDOWS\_setup.exe program is executed automatically whenever a user logs in. On Windows NT systems, a "run=_setup.exe" entry in the WIN.INI file does not appear to cause the program to be executed automatically.

When run as _setup.exe, the program will attempt to

   * make another copy of itself in C:\WINDOWS\SYSTEM\Explore.exe
   * modify the WIN.INI file again by replacing the "run=_setup.exe"
   entry with "run=C:\WINDOWS\SYSTEM\Explore.exe"

Note that when the program is run as _setup.exe, it configures the system to later run as explore.exe. But when run as explore.exe, it attempts to infect shares with valid WIN.INI files by configuring those files to run _setup.exe. Since this infection process includes local shares, affected systems may exhibit a "ping pong" behavior in which the infected host alternates between the two states.

Propagation via email

The program propagates by replying to any new email that is received by the infected computer. The reply messages are similar to the original email described above, each containing another copy of the zipped_files.exe attachment.

We will continue to update this advisory with more specific information as we are able to confirm details. Please check the CERT/CC web site for the current version containing a complete revision history.

II. Impact

* Users who execute the zipped_files.exe Trojan horse will infect the host system, potentially causing targeted files to be destroyed.
* Users who execute the Trojan horse may also infect other networked systems that have writable shares.
* Because of the large amount of network traffic generated by infected machines, network performance may suffer.
* Indirectly, this Trojan horse could cause a denial of service on mail servers. Several large sites have reported performance problems with their mail servers as a result of the propagation of this Trojan horse.

III. Solution

Use virus scanners

While many anti-virus products are able to detect and remove the executables locally, because of the continuous re-infection process, simply removing all copies of the program from an infected system may leave your system open to re-infection at a later time, perhaps immediately. To prevent re-infection, you must not serve any shares containing a WIN.INI file to any potentially infected machines. If you share files with everyone in your domain, then you must disable shares with WIN.INI files until every machine on your network has been disinfected.

In order to detect and clean current viruses, you must keep your scanning tools up to date with the latest definition files. Please see the following anti-virus vendor resources for more information about the characteristics and removal techniques for the malicious file known as ExploreZip.


Aladdin Knowledge Systems, Inc.
http://www.esafe.com/vcenter/explore.html

Central Command
http://www.avp.com/zippedfiles/zippedfiles.html

Command Software Systems, Inc
http://www.commandcom.com/html/virus/explorezip.html

Computer Associates
http://www.cai.com/virusinfo/virusalert.htm

Data Fellows
http://www.datafellows.com/news/pr/eng/19990610.htm

McAfee, Inc. (a Network Associates company)
http://www.mcafee.com/viruses/explorezip/default.asp

Network Associates Incorporated
http://www.avertlabs.com/public/datafiles/valerts/vinfo/va10185.asp

Sophos, Incorporated
http://www.sophos.com/downloads/ide/index.html#explorez

Symantec
http://www.symantec.com/avcenter/venc/data/worm.explore.zip.html

Trend Micro Incorporated
http://www.antivirus.com/vinfo/alerts.htm

Additional sources of virus information are listed at
http://www.cert.org/other_sources/viruses.html


Additional suggestions * Blocking Netbios traffic at your network border may help prevent propagation via shares from outside your network perimeter.
* Disable file serving on workstations. You will not be able to share your files with other computers, but you will be able to browse and get files from servers. This will prevent your workstation from being infected via file sharing propagation.
* Maintain a regular, off-line, backup cycle.
General protection from email Trojan horses and viruses Some previous examples of malicious files known to have propagated through electronic mail include

* False upgrade to Internet Explorer - discussed in CA-99-02
http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html

* Melissa macro virus - discussed in CA-99-04
http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html

* Happy99.exe Trojan Horse - discussed in IN-99-02
http://www.cert.org/incident_notes/IN-99-02.html

* CIH/Chernobyl virus - discussed in IN-99-03
http://www.cert.org/incident_notes/IN-99-03.html

In each of the above cases, the effects of the malicious file are activated only when the file in question is executed. Social engineering is typically employed to trick a recipient into executing the malicious file. Some of the social engineering techniques we have seen used include
* Making false claims that a file attachment contains a software patch or update
* Implying or using entertaining content to entice a user into executing a malicious file
* Using email delivery techniques which cause the message to appear to have come from a familiar or trusted source
* Packaging malicious files in deceptively familiar ways (e.g., use of familiar but deceptive program icons or file names)

The best advice with regard to malicious files is to avoid executing them in the first place. CERT advisory CA-99-02 discusses Trojan horses and offers suggestions to avoid them (please see Section V).

http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html


This document is available from:
http://www.cert.org/advisories/CA-9906-explorezip.html.


CERT/CC Contact Information


Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key. If you prefer to use DES, please call the CERT hotline for more information.

Getting security information

CERT publications and other security information are available from our web site http://www.cert.org/.

To be added to our mailing list for advisories and bulletins, send email to cert-advisory-request@cert.org and include SUBSCRIBE your-email-address in the subject of your message.

Copyright 1999 Carnegie Mellon University.
Conditions for use, disclaimers, and sponsorship information can be found in http://www.cert.org/legal_stuff.html.

* "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office



NO WARRANTY

Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.

Revision History

June 10, 1999:  Initial release
June 11, 1999: Added information about the appearance of the attached file Added information from Aladdin Knowledge Systems, Inc. June 14, 1999: Added information about the program's self-propagation via networked shares; also updated anti-virus vendor URLs



MELISSA

(added 3/29/98)

MELISSA virus affects Outlook Express: Here is the official information concerning this virus from CERT. I have condensed it down to its essentials. For more information, look at http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html

The Melissa macro virus propagates in the form of an email message containing 
an infected Word document as an attachment.  The transport message has most
frequently been reported to contain the following Subject header
   Subject: Important Message From 
Where  is the full name of the user sending the message.
*NOTE* USER MAY BE A KNOWN FRIEND OF YOURS IF THEIR MACHINE IS INFECTED!
The body of the message is a multipart MIME message containing two sections. The
first section of the message (Content-Type: text/plain) contains the following text.
   Here is that document you asked for ... don't show anyone else ;-)
The next section (Content-Type: application/msword) was initially reported to be a
document called "list.doc".  This document contains references to pornographic web
sites. As this macro virus spreads we are likely to see documents with other names.
In fact, under certain conditions the virus may generate attachments with documents
created by the victim.
When a user opens an infected .doc file with Microsoft Word97 or Word2000, the macro
virus is immediately executed if macros are enabled.
Upon execution, the virus first lowers the macro security settings to permit all
macros to run when documents are opened in the future.  Therefore, the user will
not be notified when the virus is executed in the future.
* Users who open an infected document in Word97 or Word2000 with
    macros enabled will infect the Normal.dot template causing any
    documents referencing this template to be infected with this macro
    virus. If the infected document is opened by another user, the
    document, including the macro virus, will propagate. Note that
    this could cause the user's document to be propagated instead of
    the original document, and thereby leak sensitive information.
* Indirectly, this virus could cause a denial of service on mail
    servers. Many large sites have reported performance problems with
    their mail servers as a result of the propagation of this virus.

This virus will Email itself to other addresses in your Outlook Express address book, and it will randomly remail your personal Word DOC files to others.


SUMMARY:
* Do not open documents with "Important message from ..."
* DO NOT OPEN WORD ATTACHMENTS from these messages
* Read the advisory from CERT at the address given above
    http://www.microsoft.com/security/bulletins/ms99-002.asp
* Go to Microsoft's web site and read the
    http://www.microsoft.com/security/bulletins/ms99-002.asp




HAPPY99.EXE (added 3/98)

Happy99.exe was first identified around mid-January and is now traveling across the Internet via e-mail attachments and newsgroup postings. The worm modifies e-mails and newsgroup postings by adding unauthorized attachments without the computer user's knowledge. As a side-effect, it can also create network slowdowns and, in a worst-case scenario, even crash corporate e-mail servers.

While the computer worm does not destroy or alter files or otherwise cripple computers and networks, it creates a time- and energy-consuming nuisance to network administrators.

The computer worm works on Windows 95 and 98 platforms.

Happy99.exe is classified as a computer worm for its ability for self-replication. It arrives to a computer via an e-mail or newsgroup attachment, infecting machines that run the attachment. If the computer user runs the unauthorized attachment, Happy99.exe puts up an attractive fireworks display, which the computer user might mistake for a good-looking accessory to the message.

For more information and steps to innoculate your machine from contracting this virus, please see Removing the Hapyy Virus.


[ Home ] [ Services ] [ Tech Support ] [ Community Info ] [ Links ]
[ FAQ ] [ Our Staff ] [ Web Services ] [ Contact Us ]
[ Netpath News ] [ Netpath Mail ]


Copyright © 2000, Netpath, Inc.
This site was designed and written by Mark Matherly.