Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm injects codes into the following process(es):
This worm accesses the following websites to download files:
This worm terminates and deletes itself when the following conditions are met:
This worm enumerates entries from the following registry and check for the following virtual environment:
It checks if it running in a virtual environment by checking if any of the following files are running in memory:
It also checks if opened windows or classes contain any of the following:
It also checks if the following files exist:
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files.)
This worm monitors users' browsing activities such as message posting, deleting posted messages and private messages sent on the following websites:
It may spread by posting messages in the aforementioned sites. The messages posted may contain a URL that leads to its copy.
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Scan your computer with your Trend Micro product and note files detected as WORM_EBOOM.AC
Restart in Safe Mode
To restart in Safe Mode:
• For Windows 2000 users
• For Windows XP users
• For Windows Server 2003 users
Search and delete the file detected as WORM_EBOOM.AC
To search and delete the malware/grayware file:
Restart in normal mode and scan your computer with your Trend Micro product for files detected as WORM_EBOOM.AC. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Connect with us on
| | | |