You may opt to simply delete the quarantined files. w32 blaster.worm Ive read loads from people that have had the same problem with w32 blaster.worm but all they say is they 'fixed' it. Added by a variant of the Win32.Rbot WORM X: RundllSvr: Rundll.exe: Added by the W32.HUAYU WORM X: Windows32: rundll.exe: Added by the AGOBOT-LK or AGOBOT-ND WORMS X: Windows Upate: rundll.exe: Added by the HAKO TROJAN - NOTE: this is NOT the Windows system file of the same name as described here: X: Windows Config: RUNDLL.EXE: Added by the. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required.
It drops the file 'super.exe' in the Windows System folder and can be used for a number of. Scan your computer with your Trend Micro product to delete files detected as WORMAGOBOT.GEN. W32/Agobot-S copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM Rcomputer and the Rcomputer locator vulnerabilities. W32/Agobot-SU spreads to other network computers by exploiting common buffer overflow vulnerabilites, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049) (CAN-2003-0812) and MSSQL (MS02-039) (CAN-2002-0649) and by copying itself to network shares protected by weak passwords. (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003. W32/Agobot-QT - Another worm that spreads via a network share and allows backdoor access with IRC. All comments about scvhost.exe: Added to the system as a result of the W32/Agobot-S virusthat is an IRC backdoor Trojan and network worm. W32/Agobot-SU is a worm and IRC backdoor Trojan for the Windows platform. This worm drops the following copies of itself into the affected system: This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.