This memory-resident worm is another variant of the RBOT family.
It propagates through network shares, and drops a copy of itself as WJSERC.EXE in the Windows system folder. It uses a list of passwords to gain access to shared folders.
(Note: The Windows system folder is usually C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP.)
It connects to an IRC server using its built-in IRC client engine, thus capable of certain backdoor activities. It is capable of stealing the * bitte keine illegalen Tipps *s of popular Windows-based programs.
This worm runs on Windows NT, 2000, and XP.
Ist der Org-Text von TrendMicro.
Versuchs mal mit dem Onlinescanner. Ist zwar nicht toll, kann aber RBOT angeblich entfernen.
http://housecall.trendmicro.com/