WORM RAPIDLY SPREADS IN THE WILD
Virus Name : W32.Fizzer@mm
Alias : I-Worm/Fizzer, WORM_FIZZER.A,
Virus type : Internet
level : Medium
Fizzer is a mass mailing worm spreads
through e-mail, Kazza P2P and IRC.
It also copies to shared network drives and drops
backdoor programs in the infected system. Fizzer uses e-mail
addresses collected from Windows address book and Microsoft
Outlook to send infected mails.
When the infected
attachment is executed, the worm copies itself to
Windows folder as initbak.dat,
also drops a backdoor component
and a keylogger ProgOp.exe.
creates new keys in the registry Run section to load
automatically. It also modifies the registry to load whenever a
text file is opened.
@="%windir%\ProgOp.exe 0 7 '%windir%notepad.exe
Fizzer worm infects Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
systems. The infected mail subject, message body and
attachment name are randomly chosen from the list embedded
within the worm.
Fizzer worm uses its own SMTP engine
to send infected messages. It drops backdoor programs in
the infected system. Hackers to steal your data can use it. It
also attempts to terminate antivirus programs in the infected
How can I protect my
Solo has incorporated Fizzer worm in its signature file to protect
users from this worm attack. Solo antivirus
registered users are already protected from this
worm. Make sure that you have installed
registered version of Solo Antivirus to protect
your system from all virus threats.
to remove this worm?
antivirus can detect and remove Fizzer Worm safely. Use the following link to Download
30 day trial version of Solo antivirus
remove viruses from your computer.
Solo anti-virus not only
scans for all viruses, it contains a unique System
Integrity Checker to protect you from
New Internet Worms, Backdoors and
malicious VB, Java Scripts. It also
effectively removes all existing Internet Worms,
File viruses, malicious VB, Java scripts,
Trojans, Backdoors, boot sector, partition table
and macro viruses.
purchase Solo antivirus using the link